0, 0x0, @dev, 0x3}, 0x1c) setsockopt$inet6_mreq(r5, 0x29, 0x1c, 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x1a4) 18:57:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x436d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(0x0, r1, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x8000000) r2 = syz_open_procfs(0x0, 0x0) writev(r2, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) 18:57:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x30) mknod$loop(0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 18:57:16 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x14, r1, 0xd8499488957a772f}, 0x14}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x40040800}, 0x8000) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 18:57:16 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f0000000500)={0x0, 0x3dc8, 0x0, 0x0, 0x100000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x346d, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) creat(&(0x7f0000000040)='./file0\x00', 0x0) 18:57:16 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) r5 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) mknodat$null(r5, 0x0, 0x0, 0x103) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 528.476678] udc-core: couldn't find an available UDC or it's busy [ 528.478167] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 18:57:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x436d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(0x0, r1, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x8000000) r2 = syz_open_procfs(0x0, 0x0) writev(r2, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) 18:57:16 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:57:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x30) mknod$loop(0x0, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 18:57:16 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x14, r1, 0xd8499488957a772f}, 0x14}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x40040800}, 0x8000) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 18:57:16 executing program 2: ftruncate(0xffffffffffffffff, 0xffff) r0 = creat(0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) r2 = fsmount(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000340)=ANY=[@ANYBLOB="01000000010000001800000087817f7b57af919944dde9d6c19111462bba9853dd01c398fe413a8d26eef34d802044d2363f8d97a76283525e505ea76888b12987fae5c5467b7da9d26d82906d940b21e193c2cd67c75cbbb1", @ANYRES32=r2, @ANYBLOB="0200007941418abf0f1e66696c6ac665302f66696c653000"]) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, r3, 0x3) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x4000}, {r4, 0x10a5}, {r2}, {0xffffffffffffffff, 0x40}], 0x4, 0x9) ioctl$F2FS_IOC_RESIZE_FS(r2, 0x4008f510, &(0x7f00000000c0)=0x3) pidfd_send_signal(r2, 0x28, &(0x7f00000002c0)={0x213, 0x80000001, 0x28b6}, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x460081, 0x45) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) creat(&(0x7f00000001c0)='./file0\x00', 0x1a4) 18:57:16 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f0000000500)={0x0, 0x3dc8, 0x0, 0x0, 0x100000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x346d, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 18:57:17 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x436d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(0x0, r1, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x8000000) syz_open_procfs(0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) 18:57:17 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x18000, &(0x7f00000006c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="2c776654dd646e6f3d", @ANYRESHEX, @ANYBLOB=',cache=mmap,dfltgid=', @ANYRESHEX=r0, @ANYRES32=r0]) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) timer_delete(0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x3e, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timer_gettime(r1, &(0x7f00000002c0)) timer_delete(r1) syz_usb_connect$cdc_ecm(0x2, 0x82, &(0x7f00000005c0)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x70, 0x1, 0x1, 0x7f, 0x0, 0xc1, [{{0x9, 0x4, 0x0, 0x8, 0x3, 0x2, 0x6, 0x0, 0x8, {{0xb, 0x24, 0x6, 0x0, 0x0, "4eed44406d20"}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x8000, 0x9, 0x401, 0x80}, [@mbim={0xc, 0x24, 0x1b, 0x2, 0x2, 0xf0, 0x5, 0x5, 0x60}, @mdlm={0x15, 0x24, 0x12, 0x5}, @acm={0x4, 0x24, 0x2, 0x3}, @obex={0x5, 0x24, 0x15, 0x1}, @call_mgmt={0x5, 0x24, 0x1, 0x1, 0x4}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x20, 0x9, 0x87, 0x1}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x5, 0x3, 0xc0}}}}}]}}]}}, &(0x7f0000000980)={0xa, &(0x7f00000000c0)={0xa, 0x6, 0x300, 0xd7, 0x3, 0x0, 0x20, 0x1}, 0x2a, &(0x7f0000000400)={0x5, 0xf, 0x2a, 0x4, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x6, 0x8, 0x101}, @ss_container_id={0x14, 0x10, 0x4, 0xfc, "d2979a64eaf1800b0576485e198ef4e9"}, @ext_cap={0x7, 0x10, 0x2, 0x2, 0xa, 0x1}]}, 0x4, [{0x4, &(0x7f0000000680)=@lang_id={0x4, 0x3, 0x41b}}, {0xe0, &(0x7f00000007c0)=@string={0xe0, 0x3, "57a899a406378e5634d39ec6761fa64447f25ab364caf6f4c3dc98a21b72d0f61b3898da86b501fe5057b99263116e73e90da2699dbb130408c2bce34937c30710c242106f106534e9d8c610614bf46f761be5978be49eb6af55abf95a3c5c9067c4657740defd8b93694d58caef35abdad298f10debb93b9e54482a0867ecc9067c2036bbdfe4950ca824c32adaf9b4ade2296f2ace88c59ebd441fc93f8d9d10eea0aad760b7fdc607e4ba670e767987c32aea82d19f6c78116d1b7ae7895b484b73f77b054158b99bc3961d7c673e2f08118f76758ec0a51324a919e2"}}, {0x4, &(0x7f00000008c0)=@lang_id={0x4, 0x3, 0x2c0a}}, {0x5b, &(0x7f0000000900)=@string={0x5b, 0x3, "8dcd0f7717003aba6cc5a81fae642d8b4f3334c0871465f91a6a3b5b5a631461aba62be8e6ccc5afa8ec1eed37c6a7866fadaf0472b41865167c15193bfc114a477492991e1bd3bbdf3345806a6e553f9e45fdd2d132ed177d"}}]}) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x405d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000000)={0xc92bfb053a14a5a}, 0x0) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000ac0)=ANY=[@ANYBLOB="040041b2042131d734a29ade8b0360792e8a53b0e02e668b3ca330f8b59aa7134170c5612d31161d11a6fbcd060200000024c5df081650478277b5405e62aba026eb436609209c45f379b7476400f18bcdde5eabc96bc52a72b288ef8e8d6c8201676b82e9ffc81985cabb4355c826bca259bd0dfd7397c81e880390f7118889a1b8f858430699a64f3107c5f47baebeaa56000000000000000029f7cfc5f87b6bb6d3c602f209a2aabeb298f06e73374ccc30d4fd279538bb65919ee41a214607c00774aa1c77e26391d2166fc59fc63a79db3192dfa1a84467ec07cb50e2ea1993a8bbbb1858e4422c6abd082b3754499174110315288ea4eff39a0f1406a6b9da003d50ec13a2a1633b83a0ac23914893e373000000e5f3dfd13672ea507188ac3799f84dc5feb7c30eccc2f8c3c6f6f390ed893e3df2d29efd9e3c471400a62cc65587d5ce2c4d723d2d02aa483147b430b361435e1f01dc5a3bf626957002a84006985e839e17639e0b607d5e50349af65f4f2bbd4d0346f1fdc1b2cffe4d20ca9404add59e86ba6adaaadf1d204882ab6c333951c4d1524ce9bcd4beaaa6b1d48329038ca4b24fdd5c7c0819d5c856a569abbe57c2c143709acff8b288c477a25e79eb3448c6a4e08a36402cd49229bd7f2832789d17c7e1e81a516f736faa5f78ca4ec4073f2b26e28f6e011beb747919f888890f14b3fd7aec1f8bd4f3ae3327459786fb19842dae42aa95cb3f20619c51b098f0f13ca7a757b0cd23bdee855c74363a11ff7b3784da3b78494040ab0e1c566c29cba52a7d0a20b11f98951e624b0cd5e1f2ee516bb3bdb0901fc92d5335e9ac4bb0dca63680f920f052626b4dcc070663a9f2dcebbf0c233a2dc307975f5f48ee74d68a5b9b67b6b5f92cef18a93e656b15e3aca7031d9e2b7f139420b5f7dab410"], 0x4, 0x1) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) capset(&(0x7f0000000240)={0x20080522, r3}, &(0x7f0000000300)={0x800, 0x3, 0x7, 0xd7, 0x8000, 0x6}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0xe, 0x1, @tid=r4}, &(0x7f0000000340)) fcntl$getown(r2, 0x9) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[], 0x14}}, 0x24044844) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:57:17 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x14, r1, 0xd8499488957a772f}, 0x14}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x40040800}, 0x8000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 18:57:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x30) mknod$loop(0x0, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 18:57:17 executing program 2: ftruncate(0xffffffffffffffff, 0xffff) r0 = creat(0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) r2 = fsmount(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000340)=ANY=[@ANYBLOB="01000000010000001800000087817f7b57af919944dde9d6c19111462bba9853dd01c398fe413a8d26eef34d802044d2363f8d97a76283525e505ea76888b12987fae5c5467b7da9d26d82906d940b21e193c2cd67c75cbbb1", @ANYRES32=r2, @ANYBLOB="0200007941418abf0f1e66696c6ac665302f66696c653000"]) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, r3, 0x3) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x4000}, {r4, 0x10a5}, {r2}, {0xffffffffffffffff, 0x40}], 0x4, 0x9) ioctl$F2FS_IOC_RESIZE_FS(r2, 0x4008f510, &(0x7f00000000c0)=0x3) pidfd_send_signal(r2, 0x28, &(0x7f00000002c0)={0x213, 0x80000001, 0x28b6}, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x460081, 0x45) socket$inet6_udp(0xa, 0x2, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x1a4) 18:57:17 executing program 1: r0 = syz_io_uring_setup(0x4d4f, &(0x7f0000000500)={0x0, 0x3dc8, 0x0, 0x0, 0x100000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x346d, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 529.056991] udc-core: couldn't find an available UDC or it's busy [ 529.058410] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 18:57:32 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x14, r1, 0xd8499488957a772f}, 0x14}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x40040800}, 0x8000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 18:57:32 executing program 1: syz_io_uring_setup(0x4d4f, &(0x7f0000000500)={0x0, 0x3dc8, 0x0, 0x0, 0x100000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x346d, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 18:57:32 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x436d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(0x0, r1, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x8000000) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) 18:57:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x30) mknod$loop(0x0, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 18:57:32 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x14, r1, 0xd8499488957a772f}, 0x14}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x40040800}, 0x8000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 18:57:32 executing program 2: ftruncate(0xffffffffffffffff, 0xffff) r0 = creat(0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) r2 = fsmount(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000340)=ANY=[@ANYBLOB="01000000010000001800000087817f7b57af919944dde9d6c19111462bba9853dd01c398fe413a8d26eef34d802044d2363f8d97a76283525e505ea76888b12987fae5c5467b7da9d26d82906d940b21e193c2cd67c75cbbb1", @ANYRES32=r2, @ANYBLOB="0200007941418abf0f1e66696c6ac665302f66696c653000"]) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, r3, 0x3) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x4000}, {r4, 0x10a5}, {r2}, {0xffffffffffffffff, 0x40}], 0x4, 0x9) ioctl$F2FS_IOC_RESIZE_FS(r2, 0x4008f510, &(0x7f00000000c0)=0x3) pidfd_send_signal(r2, 0x28, &(0x7f00000002c0)={0x213, 0x80000001, 0x28b6}, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x460081, 0x45) creat(&(0x7f00000001c0)='./file0\x00', 0x1a4) 18:57:32 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)={0x7c, 0x13, 0x69844ea0a6ddcd11, 0x0, 0x0, {}, [@nested={0x67, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @generic="c3c1cac85bd6c7f8339d5fb0bcb4d362861adefcea79b8e14d63b825af4d82c2645fa39fd9e5cb839ef7d315b2f0e53042bb23e09ff8c0f5c3934cf20fd67c4c132f922fb9c0b7f47636b42d099dccf6a228bc12e5a9e632100821"]}]}, 0x7c}}, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r1, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r2, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x6000, 0x6) ioctl$KIOCSOUND(r3, 0x4b2f, 0x1) preadv(r2, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) shutdown(r1, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES16=r4, @ANYBLOB], 0x100}, 0x1, 0x0, 0x0, 0x4804}, 0x0) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x70, r4, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x80}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4008000}, 0x20000010) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x4, 0x6, 0x3f, 0x4, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x8, 0x7, 0xbe07}}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x94, 0x0, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x3c}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r5}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xf2}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000580)=ANY=[@ANYBLOB="14000000b3863090026b1f1788cbb8fd6639d12dd33f49f7681f2e7d7d6b27c64b3b20e31df48749205e7f657ab7d541b77d46b7a52829e132befc4f55a6c957816277fcfa37dcdfa6bcc1fec5f939a3638cfaaad59043c424559145365d7324dd8ded4d94fbffedcb6474057b4d0d83f1610679ef60bfbc607923f462cfe1a1baa3", @ANYRES16=0x0, @ANYBLOB="00082bbd7000ffdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20006800) 18:57:32 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 543.780183] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.6'. [ 543.841467] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.6'. 18:57:32 executing program 0: ftruncate(0xffffffffffffffff, 0xffff) r0 = creat(0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) r2 = fsmount(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000340)=ANY=[@ANYBLOB="01000000010000001800000087817f7b57af919944dde9d6c19111462bba9853dd01c398fe413a8d26eef34d802044d2363f8d97a76283525e505ea76888b12987fae5c5467b7da9d26d82906d940b21e193c2cd67c75cbbb1", @ANYRES32=r2, @ANYBLOB="0200007941418abf0f1e66696c6ac665302f66696c653000"]) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, r3, 0x3) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x4000}, {r4, 0x10a5}, {r2}, {0xffffffffffffffff, 0x40}], 0x4, 0x9) ioctl$F2FS_IOC_RESIZE_FS(r2, 0x4008f510, &(0x7f00000000c0)=0x3) pidfd_send_signal(r2, 0x28, &(0x7f00000002c0)={0x213, 0x80000001, 0x28b6}, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x460081, 0x45) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) creat(&(0x7f00000001c0)='./file0\x00', 0x1a4) 18:57:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x30) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 18:57:32 executing program 1: syz_io_uring_setup(0x4d4f, &(0x7f0000000500)={0x0, 0x3dc8, 0x0, 0x0, 0x100000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x346d, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 18:57:32 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x436d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000180)=0x0) syz_io_uring_submit(0x0, r0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) 18:57:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x30) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 18:57:45 executing program 0: syz_emit_ethernet(0x7e, &(0x7f0000000000)={@broadcast, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00013f", 0x48, 0x3c, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@private2]}], @dest_unreach={0x1, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, 'A3t', 0x0, 0x0, 0x0, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}}}}}, 0x0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffb, 0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$netlink(0x10, 0x3, 0x0) syz_emit_ethernet(0x10c, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)={0x0, 0x1, [0xa1, 0x75, 0x43d, 0x772]}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000002) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x7}}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x10, 0x4) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7fff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01') sendmsg$nl_generic(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000001a401100023700"], 0x1c}}, 0x0) readv(r0, &(0x7f00000004c0)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x1) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r2, 0x409, 0xe) readv(r2, &(0x7f0000000500)=[{&(0x7f0000000080)}, {&(0x7f00000003c0)=""/234, 0xea}, {&(0x7f0000000180)=""/147, 0x93}], 0x3) socket$nl_generic(0x10, 0x3, 0x10) getpgrp(0x0) fork() 18:57:45 executing program 6: ftruncate(0xffffffffffffffff, 0xffff) r0 = creat(0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) r2 = fsmount(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000340)=ANY=[@ANYBLOB="01000000010000001800000087817f7b57af919944dde9d6c19111462bba9853dd01c398fe413a8d26eef34d802044d2363f8d97a76283525e505ea76888b12987fae5c5467b7da9d26d82906d940b21e193c2cd67c75cbbb1", @ANYRES32=r2, @ANYBLOB="0200007941418abf0f1e66696c6ac665302f66696c653000"]) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, r3, 0x3) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x4000}, {r4, 0x10a5}, {r2}, {0xffffffffffffffff, 0x40}], 0x4, 0x9) ioctl$F2FS_IOC_RESIZE_FS(r2, 0x4008f510, &(0x7f00000000c0)=0x3) pidfd_send_signal(r2, 0x28, &(0x7f00000002c0)={0x213, 0x80000001, 0x28b6}, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x460081, 0x45) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) setsockopt$inet6_mreq(r5, 0x29, 0x1c, 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x1a4) 18:57:45 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x14, r1, 0xd8499488957a772f}, 0x14}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x40040800}, 0x8000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 18:57:45 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:57:45 executing program 1: syz_io_uring_setup(0x4d4f, &(0x7f0000000500)={0x0, 0x3dc8, 0x0, 0x0, 0x100000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x346d, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 18:57:45 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x436d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000180)) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) 18:57:45 executing program 2: ftruncate(0xffffffffffffffff, 0xffff) creat(0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000340)=ANY=[@ANYBLOB="01000000010000001800000087817f7b57af919944dde9d6c19111462bba9853dd01c398fe413a8d26eef34d802044d2363f8d97a76283525e505ea76888b12987fae5c5467b7da9d26d82906d940b21e193c2cd67c75cbbb1", @ANYRES32=r1, @ANYBLOB="0200007941418abf0f1e66696c6ac665302f66696c653000"]) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, r2, 0x3) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x4000}, {r3, 0x10a5}, {r1}, {0xffffffffffffffff, 0x40}], 0x4, 0x9) ioctl$F2FS_IOC_RESIZE_FS(r1, 0x4008f510, &(0x7f00000000c0)=0x3) pidfd_send_signal(r1, 0x28, &(0x7f00000002c0)={0x213, 0x80000001, 0x28b6}, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x1a4) [ 556.831709] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=16410 sclass=netlink_route_socket pid=5872 comm=syz-executor.0 [ 556.858994] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=16410 sclass=netlink_route_socket pid=5879 comm=syz-executor.0 18:57:45 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x436d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) 18:57:45 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x14, r1, 0xd8499488957a772f}, 0x14}}, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 18:57:45 executing program 2: ftruncate(0xffffffffffffffff, 0xffff) creat(0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000340)=ANY=[@ANYBLOB="01000000010000001800000087817f7b57af919944dde9d6c19111462bba9853dd01c398fe413a8d26eef34d802044d2363f8d97a76283525e505ea76888b12987fae5c5467b7da9d26d82906d940b21e193c2cd67c75cbbb1", @ANYRES32=r1, @ANYBLOB="0200007941418abf0f1e66696c6ac665302f66696c653000"]) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, r2, 0x3) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x4000}, {r3, 0x10a5}, {r1}, {0xffffffffffffffff, 0x40}], 0x4, 0x9) ioctl$F2FS_IOC_RESIZE_FS(r1, 0x4008f510, &(0x7f00000000c0)=0x3) creat(&(0x7f00000001c0)='./file0\x00', 0x1a4) 18:57:45 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:57:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 18:57:45 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=r2], 0x38}}], 0x1, 0x0) recvfrom(r0, 0x0, 0x1000000, 0x0, 0x0, 0x0) 18:57:45 executing program 1: syz_io_uring_setup(0x4d4f, &(0x7f0000000500)={0x0, 0x3dc8, 0x0, 0x0, 0x100000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x346d, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 18:57:45 executing program 0: sendmsg$IPCTNL_MSG_CT_GET_STATS(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x14, 0x5, 0x1, 0x301, 0x0, 0x0, {0x0, 0x0, 0x4}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x2040000}, 0x2000c000) r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000009, 0x80010, r0, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f00006a8000/0x2000)=nil, 0x2000, 0x4, 0x20010, r0, 0x10000000) syz_io_uring_setup(0xb7f, &(0x7f0000000800)={0x0, 0x5cb6, 0x0, 0x1, 0x2ec, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f00001d7000/0x1000)=nil, &(0x7f0000000880)=0x0, &(0x7f00000008c0)) r6 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r6, 0x409, 0xe) fallocate(r6, 0x0, 0x0, 0x4) syz_io_uring_submit(r5, r4, &(0x7f0000000980)=@IORING_OP_WRITE={0x17, 0x1, 0x2004, @fd=r6, 0x5, &(0x7f0000000900)="fe1738e4bd035876d0cca06ceb870c46a78e452ee11063f9b0560c41bd57fd58c2d39a2699803239b2eef3e05d00caeafc02cee861027238bbf21f70f974b9cf1f3baae774bebc403214ba1882ccdebb0a8cfa582e34e23ed9cef0ed6444b014ae4db6c60bea61bf44", 0x69, 0x1}, 0xfffffffb) syz_io_uring_submit(r3, r4, &(0x7f00000006c0)=@IORING_OP_WRITEV={0x2, 0x5, 0x2003, @fd=r2, 0xc3f, &(0x7f0000000240)=[{&(0x7f0000000040)}, {&(0x7f0000000340)="9211e3b95801a2010b2ccb18035879f56e1a156ad2d807b7f16d56a43af42cec060ff0c39b1e041f51f9f43fb8e230ef4a2d7483a2843c19321e868ae369bcf2fa8dc1bdf4c47a21bf7c1109e22e5ce3eab833b666746c007fd8e520f80f848a3c283ab1db8cc855e41e3c05825ea5951a291721476b92da301a6eedcb03c17534a0ad2c8a9db20d1394639d7f23ac6091202537819d19f5e6137c2e7eef3bd2dcc3e1f29e20ec125ee70db248fc9b0a556b7f8e3c7469d9db6a02340bc012bf220f16d860abdfcc87348a7fbb7ea2643b102960cfffa923c276ca5d294e680f8156626f25", 0xe5}, {&(0x7f0000000440)="ebd25c187e1caf458c71192f7706ef0cb10d76dce1e32ebfea6975f18fa690c86f592f571a7fa8eff46389ebfc26f6dd2c2a26345353b495dd80eeff4686fad650868c43a557da55a1d93f0b0fa13a034de6049800643d69809d485881617a527e7dfcd017c2572e29024b0ab644a8a76345a8a33498989d40ca7ca7cfd49b01e63dc07c3e55182bd6a0fe54267855deb71878fccbd7d0561ce4e9d8c4644e465dfcba4e9bf72e6aa3b5266347187442923c64657c8efff52f0a36efd6a4c78f20", 0xc1}, {&(0x7f0000000080)="d24d981cf80e160932806bfa70dc107900c145a688fffb50cd37fa1f34e8ef5cfda57e9a619514dd9ca17a629f845a3e3d11efe42678fdc6a53ef4cd3d365e6ffc77f5d91c6244165e583dfb56d4db1a376c57ed9a04edc8038631bc2eecf0a93596fab37b329bf11725075ad757bd602a057e12bf77659a8716e4d4aca67c2fe364e31c2fe7b7", 0x87}, {&(0x7f0000000700)="6245f5b3f0f5535d2b123d124c4e630fc95372462e62e9331808968c7077aab9794f3a1d7c5df498a7e9400dbca40b5946b3d32f5eacfcae8d07b756344f80d78b8c6e3ce2fb716a421f3ac7649a732a6890a9ad6aa8fc7245b97998a6d8ac5731defbc61a8490688b5d007e8164e3879db758ea28f764731b28c23a34bea4454793fe71e9ad62c19c6342a44767060b5d9756d7d54433c0f196fbd65018ace2926f27f4f171b28e29bd6861720ab8ef9141ca5c679e6961dfa18b3b3a86232b4e55c5", 0xc3}, {&(0x7f0000000180)="60d0a02142bb60122a39a3d6ba60bf1ab23a0ec29f7a4fae8ef70222da62ea7181044bb07f63bf34dae1b964dd5f3849d29cfe54e2374b6b9ce363872316d376ad5919922a3d6c600d263121fb6a48551cc2920afc9d", 0x56}, {&(0x7f0000000600)="8f62d779decc6aba22e8d735993139a64b7703a67d4b7364729257dc52f7584e1852cc6e1203a3b8845742c454531c7b60e8230f4617f203710c7d001e3a81e8a86a7597dc9c879b4dcaf9b9ca023673defa63b100b0436a87a6557bd67aaedb13fb7f87524bc0e3f87ad2733bad2ee68ddc4458951c6547b7cce8eaedd852fdff60b39f5f0e86132b436f2960d069", 0x8f}], 0x7, 0x0, 0x1, {0x3}}, 0x69) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2000003, 0x1f012, r2, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) 18:57:45 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) [ 557.104676] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.106186] print_req_error: 758 callbacks suppressed [ 557.106206] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 557.109916] buffer_io_error: 398 callbacks suppressed [ 557.109928] Buffer I/O error on dev sr0, logical block 0, async page read [ 557.114334] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.115698] blk_update_request: I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 557.118235] Buffer I/O error on dev sr0, logical block 1, async page read [ 557.120558] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.121861] blk_update_request: I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 557.124158] Buffer I/O error on dev sr0, logical block 2, async page read [ 557.126127] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.127382] blk_update_request: I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 557.129909] Buffer I/O error on dev sr0, logical block 3, async page read [ 557.131607] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.132863] blk_update_request: I/O error, dev sr0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 557.135404] Buffer I/O error on dev sr0, logical block 4, async page read [ 557.142647] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.143388] blk_update_request: I/O error, dev sr0, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 557.144687] Buffer I/O error on dev sr0, logical block 5, async page read [ 557.153123] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.153941] blk_update_request: I/O error, dev sr0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 557.155544] Buffer I/O error on dev sr0, logical block 6, async page read [ 557.158362] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.159091] blk_update_request: I/O error, dev sr0, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 557.160413] Buffer I/O error on dev sr0, logical block 7, async page read [ 557.161460] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.162192] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 557.163491] Buffer I/O error on dev sr0, logical block 0, async page read [ 557.164496] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.165231] blk_update_request: I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 557.166519] Buffer I/O error on dev sr0, logical block 1, async page read [ 557.167519] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.168302] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.169127] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.169897] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.170698] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.171479] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.172356] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.173143] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.173967] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.175514] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.176374] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.177204] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.178002] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.178846] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.179949] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.180774] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.181619] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.182424] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.183255] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.184038] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.184864] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 18:57:45 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 557.185652] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.186924] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.187726] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.188568] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.189394] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.190238] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.190993] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.191915] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.192711] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.193834] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.195177] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.195981] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.196925] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.198807] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.201346] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.206301] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.207834] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.209355] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.211630] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.213177] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.215629] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.218109] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.219454] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.220935] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.222459] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.223750] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.225083] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.225849] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.226875] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.227668] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.228540] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.229316] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.230171] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.230968] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 18:57:45 executing program 1: syz_io_uring_setup(0x4d4f, &(0x7f0000000500)={0x0, 0x3dc8, 0x0, 0x0, 0x100000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x346d, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 557.231759] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.232861] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.233647] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.234462] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 18:57:45 executing program 2: ftruncate(0xffffffffffffffff, 0xffff) creat(0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000340)=ANY=[@ANYBLOB="01000000010000001800000087817f7b57af919944dde9d6c19111462bba9853dd01c398fe413a8d26eef34d802044d2363f8d97a76283525e505ea76888b12987fae5c5467b7da9d26d82906d940b21e193c2cd67c75cbbb1", @ANYRES32=r1, @ANYBLOB="0200007941418abf0f1e66696c6ac665302f66696c653000"]) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, r2, 0x3) poll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x4000}, {r3, 0x10a5}, {r1}, {0xffffffffffffffff, 0x40}], 0x4, 0x9) creat(&(0x7f00000001c0)='./file0\x00', 0x1a4) [ 557.235252] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.236332] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.237100] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.237948] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.239640] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.242597] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.244231] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.245728] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.247430] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.248932] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.250515] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.252005] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.253787] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.255599] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.256441] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.257258] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.257993] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.258951] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.259720] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.260698] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.263401] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.265079] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.268885] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.270407] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.271878] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.273553] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.275241] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.277239] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.278309] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.279064] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.279785] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.280716] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.281470] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.282323] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.283058] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.283855] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.284602] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.285401] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.286155] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.286925] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.287670] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.288444] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.289190] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.289987] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.290769] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.291554] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.292297] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.293102] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.293828] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.294680] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.295578] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.296456] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.297300] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.298134] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.299140] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.299976] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.300809] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.302409] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.303199] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.303974] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.304839] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.305728] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.306537] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.307274] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.308092] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.308810] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.309615] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.310555] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.311575] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.312597] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.313614] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.314601] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.315638] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.316408] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.317304] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.318391] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.321674] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.322516] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.323264] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.323987] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.324708] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.325469] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.326375] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.327119] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.327846] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.328622] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.329373] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.330130] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.330865] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.331746] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.332603] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.333540] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.334357] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.335386] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.336128] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.336843] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.337599] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.338336] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.339130] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.339850] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.340581] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.341339] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.342066] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.342791] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.343855] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.344654] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.345509] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.346309] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.347843] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.349752] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.350579] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.351383] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.352087] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.354334] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.355119] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.355833] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.356761] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.357539] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.358406] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.359328] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.360188] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.360968] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.361968] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.362867] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.363610] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.364338] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.365134] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.365838] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.366593] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.367326] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.368587] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.369333] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.370063] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.370785] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.371596] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.372364] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.373302] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.374114] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.375205] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.375945] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.376863] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.377877] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.378648] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.379376] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.380107] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.380846] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.381662] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.382409] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.383498] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.384353] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.385209] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.385962] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.387204] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.388932] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.390411] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.392342] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.394994] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.397149] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.397977] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.399652] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.401215] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.402163] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.403004] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.403942] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.404680] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.405477] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.406206] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.406895] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.407667] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.408388] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.409135] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.409893] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.410667] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.411409] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.412202] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.413136] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.414096] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.414990] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.415961] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.416915] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.417772] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.418513] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.419291] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.420122] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.420918] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.421660] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.422397] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.423169] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.423916] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.424640] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.425411] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.426157] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.426864] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.427580] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.428325] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.429023] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.429769] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.430490] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.431239] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.431932] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.432673] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.433408] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.434162] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.434928] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.435700] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.436418] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.437158] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.437861] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.438607] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.439325] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.440084] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.440794] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.441542] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.442245] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.442936] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.443623] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.444339] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.444991] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.445704] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.446433] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.447173] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.447845] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.448561] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.449228] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.449882] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.450604] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.451316] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.451999] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.452715] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.453430] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.454123] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.454825] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.455528] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.456282] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.456937] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.457648] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.458351] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.459070] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.459739] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.460460] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.461159] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.461945] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.464155] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.464910] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.465848] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.466575] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.467398] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.468215] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.468981] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.471599] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.472419] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.473139] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.473802] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.474809] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.475519] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.476355] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.477121] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.477835] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.478531] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.479244] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.479987] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.480817] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.481530] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.482379] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.483194] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.484004] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.488279] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.488998] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.490126] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.490818] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.491598] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.492296] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.492992] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.494186] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.494948] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.495896] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.497247] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.497910] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.498619] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.499381] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.500090] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.500804] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.501899] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.502646] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.503356] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.504689] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.505527] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.506341] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.507195] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.508478] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.509200] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.509904] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.510690] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.511433] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.512129] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.512841] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.513568] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.514328] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.515313] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.516275] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.517427] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.518358] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.519494] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.520395] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.522727] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.523590] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.524560] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.525276] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.525965] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.526676] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.527389] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.528311] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.528996] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.529848] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.530724] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.531488] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.532458] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.533156] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.533847] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.534553] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.535270] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.535940] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.536660] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.537394] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.538119] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.538880] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.539665] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.540366] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.541216] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.542575] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.562100] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 557.564586] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 557.566126] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 557.567613] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 01 40 00 00 02 00 [ 557.569527] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.588478] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 557.590735] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 557.592284] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 557.593765] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 01 40 00 00 02 00 [ 557.615188] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 557.617445] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 557.618969] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 557.620445] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 02 00 [ 557.622864] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.624570] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.626185] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.627576] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.628990] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.630761] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.632224] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.633643] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.635253] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.636676] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.638145] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.639541] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.640935] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.642379] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.643806] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.645269] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.646763] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.648244] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.649662] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.651145] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.652584] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.654323] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.656115] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.657544] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.659158] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.660551] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.661974] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.663397] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.664975] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.666610] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.668028] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.669739] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.671305] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.672699] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.674219] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.677159] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.678568] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.680131] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.681623] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.683105] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.684562] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.686168] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.687575] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.688982] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.690435] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.691866] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.693500] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.694964] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.696472] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.697931] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.699514] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.700852] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.702332] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.702997] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.704531] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.705283] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.705986] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.706933] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.707665] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.708469] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.709239] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.709952] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.710691] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.711431] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.712341] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.713325] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.714197] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.715246] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.716000] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.716759] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.717493] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.718270] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.718989] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.719882] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.721636] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.722622] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.723562] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.724504] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.725405] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.726166] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.726873] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.728113] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.729114] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.730290] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.731108] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.731826] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.732546] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.733342] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.734073] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.734787] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.735510] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.736252] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.737576] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.738706] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.739712] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.740968] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.741748] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.742468] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.743230] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.743939] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.744703] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.745505] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.746233] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.747489] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.748462] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.749229] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.750129] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.751269] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.752408] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.753222] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.754110] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.754790] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.755581] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.756288] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.757018] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.758412] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.759382] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.760115] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.761147] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.762246] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.763211] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.764910] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.765844] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.766576] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.767347] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.768220] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.769127] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.770156] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.770994] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.772301] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.773408] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.774151] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.775164] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.775843] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.776621] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.778408] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.779107] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.779807] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.780804] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.781674] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.782725] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.784422] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.785549] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.786384] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.787090] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.787780] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.788604] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.789322] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.790138] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.790828] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.791935] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.792959] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.793722] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.794935] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.796343] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.798297] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.799838] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.801358] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.802911] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.804397] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.805962] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.807474] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.808959] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.810440] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.811962] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.813474] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.815148] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.817397] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.818107] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.818770] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.819917] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.821001] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.821691] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.822581] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.823582] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.824525] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.825525] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.826411] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.827323] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.828892] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.829840] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.830804] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.831640] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.832461] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.833218] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.833908] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.834641] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.835367] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.836106] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.836799] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.837519] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.838254] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.838939] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.839655] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.840363] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.841043] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.841768] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.842478] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.843182] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.843875] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.844606] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.845310] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.845982] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.846717] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.847465] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.848182] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.848886] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.849638] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.850369] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.851084] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.851795] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.852520] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.853260] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.853940] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.854676] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.855431] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.856163] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.856844] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.857587] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.858281] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.858953] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.859784] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.861364] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.862793] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.863583] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.864450] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.865417] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.866517] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.867342] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.868373] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.869233] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.869984] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.870789] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.871587] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.872373] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.873218] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.873996] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.874721] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.875431] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.876504] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.877206] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.878167] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.878952] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.880989] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.881730] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.882475] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.883682] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.884517] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.885361] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.886211] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.887060] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.887739] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.888481] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.889298] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.890202] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.890931] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.891748] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.892544] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.893412] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.894291] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.895002] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.895713] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.896472] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.897418] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.898159] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.898831] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.899755] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.900582] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.903225] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.903951] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.904795] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.905784] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.906522] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.907394] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.908216] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.909017] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.909879] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.910589] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.911347] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.912615] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.913331] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.914062] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.914907] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.915755] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.916660] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.917710] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.918638] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.919643] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.920610] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.921670] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.922731] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.923772] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.924814] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.925918] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.926847] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.928223] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.929620] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.930991] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.932012] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.933135] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.934217] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.935251] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.936188] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.937476] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.938371] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.939435] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.940486] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.941541] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.942625] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.943510] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.944632] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.945755] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.946659] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.947712] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.948722] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.950486] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.952183] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.953851] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.956228] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.957698] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.959106] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.960500] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.961890] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.963474] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.965303] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.966885] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.968329] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.969784] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.971235] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.972684] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.974216] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.976120] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.977743] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.980575] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.985831] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.987662] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.989798] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.991754] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.993380] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.994917] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.996470] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 557.998319] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.000026] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.001528] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.003116] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.004693] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.006436] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.008603] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.010326] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.012000] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.013556] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.015285] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.016923] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.018444] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.020250] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.021812] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.023491] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.025529] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.027176] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.028738] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.030306] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.032488] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.034172] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.035771] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.037347] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.038895] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.041285] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.042866] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.044363] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.046538] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.048009] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.049654] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.051255] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.052842] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.054412] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.056829] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.058583] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.060537] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.062220] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.063911] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.065589] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.067212] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.068787] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.071401] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.073171] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.074906] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.076625] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.078146] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.079538] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.081006] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.082370] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.087317] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.088695] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.090531] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.091968] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.093572] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.098203] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.100113] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.101584] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.103270] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.104925] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.106370] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.108285] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.109964] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.111406] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.112979] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.114445] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.115855] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.117372] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.119008] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.120543] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.122104] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.123554] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.125128] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.126606] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.128387] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.129950] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.131520] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.133128] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.134466] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.136301] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.153445] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 558.155722] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 558.157243] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 558.158688] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 01 00 00 01 00 [ 558.160572] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.162189] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.164293] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.167193] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.185146] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 558.188354] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 558.189923] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 558.191414] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 01 00 00 01 00 [ 558.193473] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.194906] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.196343] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.197770] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.199405] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.200846] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.202226] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.203679] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.205228] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.206562] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.208072] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.209407] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.210851] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.212156] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.213401] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.214799] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.216161] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.217440] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.218749] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.220078] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.221347] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.222622] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.223915] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.225231] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.226600] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.227892] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.229241] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.230550] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.231885] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.233209] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.234529] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.235832] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.237254] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.238614] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.239937] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.241263] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.242604] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.243920] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.245255] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.246583] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.247952] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.249286] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.250594] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.251920] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.253248] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.254584] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.255943] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.257297] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.259292] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.260720] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.262167] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.263531] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.264906] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.266304] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.267614] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.269000] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.271464] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.273468] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.275120] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.276605] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.278117] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.280403] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.282421] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.284140] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.285498] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.287352] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.288828] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.291992] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.293803] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.295405] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.296905] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.298258] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.299978] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.301547] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.302830] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.304563] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.306429] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.308216] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.309638] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.311141] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.312495] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.313862] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.315349] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.317270] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.318747] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.320628] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.322261] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.323732] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.325386] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.326931] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.328499] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.329960] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.331335] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.332660] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.333965] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.335897] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.337823] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.339255] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.341127] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.342604] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.344013] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.346295] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.347624] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.349170] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.350863] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.352510] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.354175] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.355638] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.357601] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.359109] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.360786] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.362463] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.364151] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.365560] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.367206] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.368791] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.370268] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.371496] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.372900] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.374312] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.375621] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.376960] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.378202] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.379471] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.380696] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.381928] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.383186] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.384403] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.385607] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.386974] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.388428] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.389746] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.391124] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.393116] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.394306] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.395505] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.396722] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.398064] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.399268] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.400562] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.402001] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.403379] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.404746] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.406271] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.407641] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.409086] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.410468] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.411904] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.413326] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.414705] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.416220] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.417807] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.419194] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.420571] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.421956] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.423439] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.424633] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.426218] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.427638] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.429140] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.430322] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.431588] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.432911] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.434276] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.435460] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.436648] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.438107] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.439336] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.440620] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.441834] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.443057] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.444257] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.445907] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.447324] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.449097] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.450610] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.452268] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.453670] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.455119] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.456620] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.457836] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.459124] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.460275] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.461624] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.462787] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.463954] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.465153] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.466964] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.468927] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.470750] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.472168] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.473549] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.475002] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.476449] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.477843] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.479302] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.480479] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.482025] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.483224] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.484556] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.485709] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.486960] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.488148] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.489687] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.491318] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.492703] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.496317] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.497790] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.499523] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.501795] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.503845] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.505320] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.506474] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.507667] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.508789] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.510254] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.511415] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.512596] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.513705] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.514854] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.516782] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.519405] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.520908] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.522432] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.524074] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.525606] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.527272] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.528682] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.530457] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.531686] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.533121] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.535905] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.537483] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.538858] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.540292] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.541674] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.543160] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.545539] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.546962] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.548494] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.550159] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.552300] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.553729] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.555106] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.557096] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.558839] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.560262] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.562094] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.563404] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.565161] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.566785] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.568302] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.569894] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.571323] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.572852] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.574350] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.575999] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.577499] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.578954] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.580457] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.581884] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.583654] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.585210] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.586644] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.588226] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.589898] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.591483] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.592919] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.594296] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.595684] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.599220] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.600684] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.602428] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.603847] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.605505] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.607189] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.608636] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.610106] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.611654] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.613439] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.614918] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.616281] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.617790] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.619440] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.620954] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.622361] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.623930] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.624990] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.627736] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.629310] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.632065] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.634321] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.637302] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.638685] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.642339] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.645797] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.647319] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.649250] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.651333] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.653535] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.654875] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.656425] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.658174] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.661171] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.662754] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.664318] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.666913] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.668475] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.670122] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.671949] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.673369] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.674994] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.677611] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.679390] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.680800] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.682492] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.683888] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.685391] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.686789] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.688258] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.689685] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.691149] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.692558] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.693962] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.695369] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.696757] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.698189] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.700634] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.702286] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.703732] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.705159] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.706564] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.707951] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.709412] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.710831] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.712248] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.713662] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.715120] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.716529] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.717942] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.719354] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.720744] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.722174] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.723561] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.725110] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.726661] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.728124] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.729500] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.730885] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.732278] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.733689] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.735144] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.736572] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.737954] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.739358] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.740765] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.742197] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.743568] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.744966] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.746346] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.747825] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.749299] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.750724] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.752182] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.753822] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.755584] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.757133] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.758765] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.760244] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.761787] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.763493] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.765106] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.766808] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.768217] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.769799] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.771430] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.773194] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.774922] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.776423] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.778004] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.779400] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.780983] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.782631] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.784118] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.785575] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.786988] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.788577] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.790003] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.791585] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.793271] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.794876] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.796286] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.797957] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.799693] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.802379] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.803777] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.805368] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.806782] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.808418] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.810117] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.811703] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.813423] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.815101] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.816674] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.818157] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.819860] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.821431] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.823214] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.824989] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.826601] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.828265] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.829706] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.831254] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.833007] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.834552] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.836255] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.837883] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.839621] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.841225] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.842848] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.844336] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.846119] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.847592] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.849062] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.850825] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.852458] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.854180] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.855741] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.857455] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.858878] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.860281] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.861826] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.863625] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.865193] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.866680] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.868370] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.870133] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.871638] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.873133] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.874845] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.876419] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.878101] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.879656] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.881132] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.882657] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.884324] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.885973] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.887639] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.889366] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.890958] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.892729] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.894399] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.896220] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.897953] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.899521] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.901339] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.902945] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.905617] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.907278] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.909014] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.910452] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.911944] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.913672] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.915346] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.917075] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.918538] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.920077] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.921809] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.923405] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.925235] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.926679] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.928342] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.929991] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.931535] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.933141] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.934829] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.936277] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.938130] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.939669] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.941367] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.942935] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.944682] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.946479] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.948109] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.949822] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.951368] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.953144] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.954873] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.956569] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.958306] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.959971] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.961657] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.963286] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.964972] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.966590] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.968292] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.969964] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.971667] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.973464] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.974958] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.976863] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.978220] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.979620] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.982232] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.984870] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.986560] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.988007] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.989649] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.991328] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.992983] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.994762] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.996550] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.998231] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 558.999895] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.001528] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.002965] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.004559] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.007162] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.008605] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.010284] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.012169] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.013787] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.015421] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.016969] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.018759] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.020420] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.022262] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.023559] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.024950] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.026554] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.028015] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.029845] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.031468] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.033294] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.034889] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.036669] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.038421] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.040239] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.041960] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.043706] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.045425] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.047190] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.049010] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.050753] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.052486] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.054200] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.055869] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.057472] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.058985] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.060461] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.061946] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.063535] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.065340] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.066908] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.068777] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.070425] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.072218] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.073947] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.075654] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.077475] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.078953] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.080434] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.082016] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.083793] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.085558] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.087993] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.089489] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.091247] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.092979] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.094802] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.096280] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.097881] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.099706] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.101366] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.103184] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.104773] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.106286] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.107943] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.110457] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.112026] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.113781] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.115676] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.117320] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.119102] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.120740] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.122494] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.124310] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.125893] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.127655] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.129230] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.130888] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.132667] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.134301] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.136072] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.137669] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.139199] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.140891] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.142531] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.144304] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.145992] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.147963] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.173073] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=1s [ 559.175396] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 559.177016] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 559.178759] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 06 00 00 02 00 [ 559.181115] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.202807] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=1s [ 559.204823] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 559.206273] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 559.207671] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 02 00 [ 559.223915] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 559.225968] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 559.227401] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 559.228783] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 06 00 00 02 00 [ 559.244838] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 559.246920] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 559.248396] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 559.249783] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 02 00 [ 559.275670] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 559.277773] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 559.279262] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 559.280686] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 02 00 [ 559.393176] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.409901] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.411485] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.412848] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.414251] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.417898] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.419318] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.420661] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.422479] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.423961] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.425443] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.426831] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.428204] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.429600] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.430961] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.432377] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.433784] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.435186] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.437253] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.440349] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.442247] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.443780] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.445286] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.447005] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.448495] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.450082] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.451576] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.453185] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.454711] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.456882] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.458907] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.460667] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.462462] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.464163] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.465774] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.468759] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.470986] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.472887] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.474932] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.476578] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.478925] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.480755] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.482382] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.483941] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.485339] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.486788] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.488373] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.490319] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.491932] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.493369] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.495538] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.497546] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.499165] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.500589] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.502630] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.504479] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.506569] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.508094] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.510167] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.511885] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.513614] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.515407] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.517376] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.519525] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.521323] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.523459] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.524894] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.527633] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.529639] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.531611] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.533588] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.535145] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.536664] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.538252] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.539686] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.541915] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.544280] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.546375] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.547934] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.550764] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.552977] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.554951] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.558203] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.559896] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.561625] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.563299] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.565791] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.567388] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.568919] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.570349] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.571779] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.573188] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.574792] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.576653] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.578085] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.579601] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.581132] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.583080] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.584671] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.586242] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.587690] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.589750] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.591256] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.592550] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.593973] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.595350] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.597400] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.598938] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.600519] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.601942] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.604390] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.606147] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.607762] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.609513] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.610901] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.613419] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.614982] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.616279] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.617628] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.619187] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.622505] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.623826] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.625398] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.627631] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.629239] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.630698] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.632189] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.634858] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.636256] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.637890] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.639670] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.641299] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.643429] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.644891] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.646260] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.647672] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.649190] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.650737] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.652651] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.654214] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.656314] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.657979] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.659622] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.661304] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.663376] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.664719] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.666617] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.668195] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.669705] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.671566] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.672994] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.674351] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.675950] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.677369] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.678846] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.680427] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.682187] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.683476] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.685403] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.686826] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.688502] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.689911] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.691571] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.693243] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.694753] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.696573] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.698209] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.699774] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.701363] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.703172] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.704759] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.706485] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.708158] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.709779] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.711459] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.713069] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.714711] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.716331] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.717999] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.719608] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.721281] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.724810] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.726477] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.728106] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.729836] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.731192] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.732972] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.734340] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.735895] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.737456] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.738895] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.740458] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.742026] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.743500] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.745228] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.746721] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.748405] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.749980] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.751387] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.753262] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.754819] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.756345] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.757905] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.759406] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.761125] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.762579] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.764180] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.765729] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.767825] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.769721] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.771131] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.772405] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.773750] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.792807] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.794420] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.795833] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.797868] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.799998] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.801498] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.802856] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.804307] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.805634] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.806973] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.808352] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.809835] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.811156] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.813091] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.814784] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.816406] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.817959] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.819315] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.820732] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.822221] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.824283] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.828688] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.830683] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.832736] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.834395] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.835890] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.837299] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.838807] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.840559] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.842216] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.843625] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.845276] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.846688] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.850439] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.852066] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.853573] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.855992] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.858610] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.860149] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.861506] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.863746] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.865652] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.867344] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.868880] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.870273] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.872287] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.873905] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.875551] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.877153] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.878540] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.880530] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.882538] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.884079] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.885485] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.887497] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.889773] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.891222] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.892508] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.894302] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.896846] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.898404] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.899859] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.901839] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.903764] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.905454] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.907550] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.909551] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.911027] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.912494] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.914574] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.916183] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.917933] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.919434] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.921304] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.923579] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.925687] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.927328] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.930589] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.931927] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.935076] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.936576] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.938222] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.939634] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.941084] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.943382] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.945461] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.947100] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.948503] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.950579] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.952594] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.954418] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.956504] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.958417] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.960011] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.961434] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.963455] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.964841] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.966494] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.968003] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.969558] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.970951] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.972836] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.974309] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.975644] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.977527] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.979147] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.980631] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.982614] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.984560] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.986202] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.987589] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.989548] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.990958] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.992265] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.993629] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.995525] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.997132] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.998494] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 559.999814] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.002501] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.003808] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.005278] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.006728] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.008205] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.009537] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.010876] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.012529] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.014117] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.015666] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.017025] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.018412] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.019997] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.021515] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.023055] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.024831] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.026423] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.028147] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.029684] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.033245] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.036743] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.038311] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.039862] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.041390] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.043508] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.045014] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 560.046684] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 18:58:01 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) 18:58:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x72, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000}, 0x0, 0x800000000, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x14, 0x0, 0x0, @pid}]}]}, 0x28}}, 0x0) 18:58:01 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wg0\x00', 0x0}) socket$packet(0x11, 0x2, 0x300) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000200)={'ip6tnl0\x00', r1, 0x4, 0x6, 0xf5, 0x295faaa0, 0x30, @remote, @empty, 0x0, 0x700, 0x3, 0xffffafaf}}) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) 18:58:01 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 18:58:01 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:58:01 executing program 1: syz_io_uring_setup(0x4d4f, &(0x7f0000000500)={0x0, 0x3dc8, 0x0, 0x0, 0x100000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x346d, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 18:58:01 executing program 2: ftruncate(0xffffffffffffffff, 0xffff) creat(0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000340)=ANY=[@ANYBLOB="01000000010000001800000087817f7b57af919944dde9d6c19111462bba9853dd01c398fe413a8d26eef34d802044d2363f8d97a76283525e505ea76888b12987fae5c5467b7da9d26d82906d940b21e193c2cd67c75cbbb1", @ANYRES32=r1, @ANYBLOB="0200007941418abf0f1e66696c6ac665302f66696c653000"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, r2, 0x3) creat(&(0x7f00000001c0)='./file0\x00', 0x1a4) 18:58:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 18:58:01 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) 18:58:01 executing program 2: ftruncate(0xffffffffffffffff, 0xffff) creat(0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000340)=ANY=[@ANYBLOB="01000000010000001800000087817f7b57af919944dde9d6c19111462bba9853dd01c398fe413a8d26eef34d802044d2363f8d97a76283525e505ea76888b12987fae5c5467b7da9d26d82906d940b21e193c2cd67c75cbbb1", @ANYRES32=r1, @ANYBLOB="0200007941418abf0f1e66696c6ac665302f66696c653000"]) creat(&(0x7f00000001c0)='./file0\x00', 0x1a4) 18:58:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 18:58:02 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 18:58:16 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 18:58:16 executing program 1: syz_io_uring_setup(0x4d4f, &(0x7f0000000500)={0x0, 0x3dc8, 0x0, 0x0, 0x100000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 18:58:16 executing program 2: ftruncate(0xffffffffffffffff, 0xffff) creat(0x0, 0x0) syz_open_procfs(0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x1a4) 18:58:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000200)=ANY=[]) lseek(0xffffffffffffffff, 0x7, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) statx(0xffffffffffffffff, &(0x7f0000001680)='./file0\x00', 0x0, 0x8, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r4, r5, 0x1000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x1, r7}}, 0x10001) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001640)=@IORING_OP_OPENAT2={0x1c, 0x2, 0x0, 0xffffffffffffff9c, &(0x7f0000000440)={0xf0000, 0x100, 0x4}, &(0x7f0000001600)='./file1\x00', 0x18, 0x0, 0x12345, {0x0, r7}}, 0x3) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000240)='./file1\x00', 0x80000000, 0x4, &(0x7f0000001500)=[{&(0x7f0000000280)="efeb8804ab81880d3e2525f4f7f7e12818188c423f4a", 0x16, 0xffffffffffffffe1}, {&(0x7f0000000500)="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", 0x1000, 0x1}, {&(0x7f00000002c0)="d53c24202ef4ace3b09f61c4b5cebda77dc2fab5b10640ee892dc2cf6f2c7577f7e9dec83095a175748173b092a843736d16960e3dd8f30e261dd9e5b42befb04983ad8fa301510af21bbfbcd7e766b650380a4fe6b576893b2fa31d9b40e209f7bb5404e0aba349213ab1ff6e743ba524fe06d1e9", 0x75, 0x7ff}, {&(0x7f0000000340)="9562dc3800c30925dd3a030c631255d7a6e1450442bdaa0475c59c03340e9f42bc618ff5b60385ac7ac30331b384a45b13268b75c05f6ad5e3450a3ba6a8fad29553d3914cf827450c3ed4a3a6a9eb25b07c2ef5f7ebd6b9cb8a6f18d3b9cedb4090a8b63f12d5f3c6b910e981962cb90b2cb522d229f44d8c1caefa1cd2359c53cc17b36f8824f0aa9c064b0e95ef80c6ad617d5712529318bb5bbf6c97dd9b9000de52383519fd3989353fb8ec801d1ac6014633ceb746f73b7387b382efc335834be7ecb8c1a7fc98cdaa5e6f9e55c3f280ce06725bc8fef7de6fa9fff895f1a60e361520b89e998298acc45c36cb", 0xf0, 0x7}], 0x210000, &(0x7f0000001580)={[{@rodir}], [{@context={'context', 0x3d, 'system_u'}}, {@dont_measure}, {@fowner_gt={'fowner>', r4}}]}) 18:58:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x161000, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r1, 0x5000940f, &(0x7f0000000640)={{r1}, "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"}) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @dev={0xac, 0x14, 0x14, 0x41}, @remote}, 0xc) setsockopt$inet_mreqsrc(r3, 0x0, 0xc, &(0x7f0000001480)={@broadcast, @dev={0xac, 0x14, 0x14, 0x60}, @empty}, 0xc) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) dup3(r4, 0xffffffffffffffff, 0x0) openat(r4, &(0x7f0000000200)='./file1\x00', 0x111800, 0x0) setsockopt$inet_group_source_req(r3, 0x0, 0x2f, &(0x7f0000000240)={0x3, {{0x2, 0x4e22, @broadcast}}, {{0x2, 0x4e20, @loopback}}}, 0x108) close(r3) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000140)={'nat\x00', 0x0, [0x5, 0x5, 0x0, 0x5, 0x94]}, &(0x7f00000001c0)=0x54) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x22b80, 0x1b7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) pipe(&(0x7f0000000040)) ioprio_get$pid(0x3, 0x0) 18:58:16 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:58:16 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) 18:58:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x30) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 588.097506] loop0: detected capacity change from 0 to 33559040 18:58:16 executing program 2: ftruncate(0xffffffffffffffff, 0xffff) creat(0x0, 0x0) syz_open_procfs(0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x1a4) 18:58:16 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 18:58:16 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0x0) 18:58:16 executing program 1: syz_io_uring_setup(0x4d4f, &(0x7f0000000500)={0x0, 0x3dc8, 0x0, 0x0, 0x100000}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 18:58:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x30) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 18:58:16 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:58:16 executing program 6: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x400080, 0x100) r2 = fsopen(&(0x7f00000000c0)='rpc_pipefs\x00', 0x0) r3 = open$dir(&(0x7f0000000dc0)='./file1\x00', 0x200, 0x0) renameat(r3, &(0x7f0000000e00)='./file1\x00', r0, &(0x7f0000000e40)='./file1\x00') fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xfef}, 0x40040, 0x0, 0x40}, 0x0, 0xffffffffffffffff, r1, 0x0) r5 = dup2(r4, r2) r6 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x3104100, &(0x7f0000000740)=ANY=[@ANYBLOB="80"]) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x28, 0x13, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xd, 0x0, 0x0, @pid}]}]}, 0x28}}, 0x0) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r5, 0xf503, 0x0) fallocate(r8, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r8, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r8, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) ioctl$LOOP_SET_FD(r8, 0x4c00, r6) 18:58:16 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0x0) 18:58:16 executing program 2: ftruncate(0xffffffffffffffff, 0xffff) creat(0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x1a4) 18:58:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x30) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 18:58:30 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 18:58:30 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 18:58:30 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x30) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 18:58:30 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000001580)='status\x00') readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000001780)=""/251, 0xfb}, {&(0x7f0000001500)=""/102, 0x66}, {&(0x7f0000001b40)=""/109, 0x6d}], 0x3) readv(r1, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) readv(r1, &(0x7f0000001ac0)=[{&(0x7f0000000080)}, {&(0x7f00000002c0)=""/120, 0x78}, {0x0}, {&(0x7f0000001880)=""/221, 0xdd}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000240)=""/25, 0x19}, {&(0x7f0000001a40)=""/86, 0x56}], 0x7) readv(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000001640)=""/79, 0x4f}, {&(0x7f0000000200)=""/58, 0x3a}, {&(0x7f00000016c0)=""/100, 0x64}], 0x3) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) ioctl$FIONREAD(r2, 0x6801, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000380)=""/215, 0xd7) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x40010, 0xffffffffffffffff, 0xbcebb000) mount$9p_unix(&(0x7f0000000140)='./file1\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x1f381d, 0x0) write$P9_RXATTRCREATE(r2, &(0x7f0000000340)={0x7, 0x21, 0x2}, 0x7) openat$bsg(0xffffffffffffff9c, &(0x7f00000014c0), 0x103, 0x0) unshare(0x48020200) 18:58:30 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0x0) 18:58:30 executing program 2: ftruncate(0xffffffffffffffff, 0xffff) creat(&(0x7f00000001c0)='./file0\x00', 0x1a4) 18:58:30 executing program 6: r0 = semget$private(0x0, 0x4, 0x100) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4317, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000040)=[{0x0, 0x4, 0x82b4d8da1ae7c66c}], 0x1) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)=0x0) stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d91e31b7892f71f3ac842db783e431d605372ea606c253e7c4ff3d013e13614b38210b49077cca3b953d867fd849b8fe2ff2f49a2849f897aa0aa580d9181e218f7c241c047d0a0ef6ba946c262de8447d2ec926ffc3aaadd9660fff9cea9b11f2ff3704df391d2bdb33465bfa785d15ef405e901c59cb0dfc75ae84a5ce85db5f2f363979cb753db1587", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',cache=mmap,cache=loose,noextend,nodevmap,dont_appraise,dont_measure,subj_type=,dont_measure,fscontext=system_u,fsmagic=0x000000000000008c,uid=', @ANYRESDEC=r2, @ANYBLOB="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"]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000002c0)={{0x1, 0x0, 0x0, r2, 0x0, 0x39, 0x8}, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7}) r3 = semget$private(0x0, 0x4000, 0x0) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000340)=""/99) semctl$IPC_RMID(r3, 0x0, 0x0) r4 = semget(0x2, 0x0, 0x20b) r5 = getuid() stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f00000002c0)={{0x1, r5, r1, r6, 0x0, 0x39, 0x8}, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280), 0x20000, &(0x7f00000003c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@loose}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}}) semtimedop(r4, &(0x7f0000000080)=[{0x0, 0x4, 0x1000}], 0x1, &(0x7f0000000100)={r7, r8+10000000}) semctl$SEM_INFO(0x0, 0x935a4533181df21f, 0x13, &(0x7f0000001e00)=""/4096) semctl$SEM_INFO(r0, 0x3, 0x13, &(0x7f0000000000)=""/35) unshare(0x48020200) 18:58:30 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:58:44 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x1a4) 18:58:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bond0\x00'}) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$int_in(r2, 0x5452, &(0x7f00000000c0)=0x9) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x2, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000100), 0x8001, 0x120002) write$binfmt_elf64(r4, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0xf9, 0x2, 0x5, 0x3, 0x800, 0x3, 0x3, 0x400, 0x10c, 0x40, 0x1e7, 0x7ff, 0x7f, 0x38, 0x1, 0x4a52, 0x3, 0x1}, [{0x2, 0x2, 0x8, 0x3, 0x1, 0x7fff, 0x3e, 0x7fffffff}], "a2178c958b2822d990ffbf8c959df005fdd2c0d20c20437fc129a5ae96d69cfe49a8a4e510e63ef203de1f5abe9932e4cb3ef3705d", ['\x00', '\x00', '\x00', '\x00']}, 0x4ad) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000000)) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x1100, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 18:58:44 executing program 6: r0 = semget$private(0x0, 0x4, 0x100) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4317, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000040)=[{0x0, 0x4, 0x82b4d8da1ae7c66c}], 0x1) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)=0x0) stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d91e31b7892f71f3ac842db783e431d605372ea606c253e7c4ff3d013e13614b38210b49077cca3b953d867fd849b8fe2ff2f49a2849f897aa0aa580d9181e218f7c241c047d0a0ef6ba946c262de8447d2ec926ffc3aaadd9660fff9cea9b11f2ff3704df391d2bdb33465bfa785d15ef405e901c59cb0dfc75ae84a5ce85db5f2f363979cb753db1587", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',cache=mmap,cache=loose,noextend,nodevmap,dont_appraise,dont_measure,subj_type=,dont_measure,fscontext=system_u,fsmagic=0x000000000000008c,uid=', @ANYRESDEC=r2, @ANYBLOB="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"]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000002c0)={{0x1, 0x0, 0x0, r2, 0x0, 0x39, 0x8}, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7}) r3 = semget$private(0x0, 0x4000, 0x0) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000340)=""/99) semctl$IPC_RMID(r3, 0x0, 0x0) r4 = semget(0x2, 0x0, 0x20b) r5 = getuid() stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f00000002c0)={{0x1, r5, r1, r6, 0x0, 0x39, 0x8}, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280), 0x20000, &(0x7f00000003c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@loose}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}}) semtimedop(r4, &(0x7f0000000080)=[{0x0, 0x4, 0x1000}], 0x1, &(0x7f0000000100)={r7, r8+10000000}) semctl$SEM_INFO(0x0, 0x935a4533181df21f, 0x13, &(0x7f0000001e00)=""/4096) semctl$SEM_INFO(r0, 0x3, 0x13, &(0x7f0000000000)=""/35) unshare(0x48020200) 18:58:44 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:58:44 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x30) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 18:58:44 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 18:58:44 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) (fail_nth: 1) 18:58:44 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 18:58:44 executing program 2: creat(0x0, 0x1a4) [ 616.397647] FAULT_INJECTION: forcing a failure. [ 616.397647] name failslab, interval 1, probability 0, space 0, times 1 [ 616.399092] CPU: 0 PID: 6048 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 616.399921] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 616.400931] Call Trace: [ 616.401260] dump_stack+0x107/0x167 [ 616.401710] should_fail.cold+0x5/0xa [ 616.402188] ? getname_flags.part.0+0x50/0x4f0 [ 616.402746] should_failslab+0x5/0x20 [ 616.403219] kmem_cache_alloc+0x5b/0x310 [ 616.403718] getname_flags.part.0+0x50/0x4f0 [ 616.404256] getname+0x8e/0xd0 [ 616.404647] do_sys_openat2+0xf9/0x4d0 [ 616.405127] ? build_open_flags+0x6f0/0x6f0 [ 616.405652] ? __mutex_unlock_slowpath+0xe1/0x600 [ 616.406247] ? wait_for_completion_io+0x270/0x270 [ 616.406841] __x64_sys_openat+0x13f/0x1f0 [ 616.407342] ? __ia32_sys_open+0x1c0/0x1c0 [ 616.407857] ? ksys_write+0x1a9/0x260 [ 616.408329] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 616.408970] ? syscall_enter_from_user_mode+0x1d/0x50 [ 616.409594] do_syscall_64+0x33/0x40 [ 616.410064] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 616.410684] RIP: 0033:0x7ff27c0cdb19 [ 616.411139] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 616.413361] RSP: 002b:00007ff279643188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 616.414303] RAX: ffffffffffffffda RBX: 00007ff27c1e0f60 RCX: 00007ff27c0cdb19 [ 616.415179] RDX: 0000000000105142 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 616.416050] RBP: 00007ff2796431d0 R08: 0000000000000000 R09: 0000000000000000 [ 616.416917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 616.417788] R13: 00007ffe2ad57a7f R14: 00007ff279643300 R15: 0000000000022000 18:58:44 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x30) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 18:58:44 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:58:44 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 18:58:44 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 18:58:44 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) (fail_nth: 2) 18:58:44 executing program 2: creat(0x0, 0x1a4) 18:58:44 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 616.697194] FAULT_INJECTION: forcing a failure. [ 616.697194] name failslab, interval 1, probability 0, space 0, times 0 [ 616.698722] CPU: 0 PID: 6068 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 616.699588] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 616.700549] Call Trace: [ 616.700860] dump_stack+0x107/0x167 [ 616.701285] should_fail.cold+0x5/0xa [ 616.701727] ? create_object.isra.0+0x3a/0xa20 [ 616.702256] should_failslab+0x5/0x20 [ 616.702688] kmem_cache_alloc+0x5b/0x310 [ 616.703154] create_object.isra.0+0x3a/0xa20 [ 616.703654] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 616.704234] kmem_cache_alloc+0x159/0x310 [ 616.704710] getname_flags.part.0+0x50/0x4f0 [ 616.705217] getname+0x8e/0xd0 [ 616.705583] do_sys_openat2+0xf9/0x4d0 [ 616.706035] ? build_open_flags+0x6f0/0x6f0 [ 616.706528] ? __mutex_unlock_slowpath+0xe1/0x600 [ 616.707075] ? wait_for_completion_io+0x270/0x270 [ 616.707629] __x64_sys_openat+0x13f/0x1f0 [ 616.708096] ? __ia32_sys_open+0x1c0/0x1c0 [ 616.708579] ? ksys_write+0x1a9/0x260 [ 616.709014] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 616.709618] ? syscall_enter_from_user_mode+0x1d/0x50 [ 616.710220] do_syscall_64+0x33/0x40 [ 616.710645] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 616.711224] RIP: 0033:0x7ff27c0cdb19 [ 616.711647] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 616.713723] RSP: 002b:00007ff279643188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 616.714602] RAX: ffffffffffffffda RBX: 00007ff27c1e0f60 RCX: 00007ff27c0cdb19 [ 616.715414] RDX: 0000000000105142 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 616.716233] RBP: 00007ff2796431d0 R08: 0000000000000000 R09: 0000000000000000 [ 616.717042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 616.717849] R13: 00007ffe2ad57a7f R14: 00007ff279643300 R15: 0000000000022000 18:58:45 executing program 6: r0 = semget$private(0x0, 0x4, 0x100) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4317, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000040)=[{0x0, 0x4, 0x82b4d8da1ae7c66c}], 0x1) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)=0x0) stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d91e31b7892f71f3ac842db783e431d605372ea606c253e7c4ff3d013e13614b38210b49077cca3b953d867fd849b8fe2ff2f49a2849f897aa0aa580d9181e218f7c241c047d0a0ef6ba946c262de8447d2ec926ffc3aaadd9660fff9cea9b11f2ff3704df391d2bdb33465bfa785d15ef405e901c59cb0dfc75ae84a5ce85db5f2f363979cb753db1587", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',cache=mmap,cache=loose,noextend,nodevmap,dont_appraise,dont_measure,subj_type=,dont_measure,fscontext=system_u,fsmagic=0x000000000000008c,uid=', @ANYRESDEC=r2, @ANYBLOB="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"]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000002c0)={{0x1, 0x0, 0x0, r2, 0x0, 0x39, 0x8}, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7}) r3 = semget$private(0x0, 0x4000, 0x0) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000340)=""/99) semctl$IPC_RMID(r3, 0x0, 0x0) r4 = semget(0x2, 0x0, 0x20b) r5 = getuid() stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f00000002c0)={{0x1, r5, r1, r6, 0x0, 0x39, 0x8}, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280), 0x20000, &(0x7f00000003c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@loose}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}}) semtimedop(r4, &(0x7f0000000080)=[{0x0, 0x4, 0x1000}], 0x1, &(0x7f0000000100)={r7, r8+10000000}) semctl$SEM_INFO(0x0, 0x935a4533181df21f, 0x13, &(0x7f0000001e00)=""/4096) semctl$SEM_INFO(r0, 0x3, 0x13, &(0x7f0000000000)=""/35) unshare(0x48020200) 18:58:59 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x30) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 18:58:59 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:58:59 executing program 2: creat(0x0, 0x1a4) 18:58:59 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 18:58:59 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 18:58:59 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) (fail_nth: 3) 18:58:59 executing program 6: r0 = semget$private(0x0, 0x4, 0x100) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4317, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000040)=[{0x0, 0x4, 0x82b4d8da1ae7c66c}], 0x1) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)=0x0) stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d91e31b7892f71f3ac842db783e431d605372ea606c253e7c4ff3d013e13614b38210b49077cca3b953d867fd849b8fe2ff2f49a2849f897aa0aa580d9181e218f7c241c047d0a0ef6ba946c262de8447d2ec926ffc3aaadd9660fff9cea9b11f2ff3704df391d2bdb33465bfa785d15ef405e901c59cb0dfc75ae84a5ce85db5f2f363979cb753db1587", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',cache=mmap,cache=loose,noextend,nodevmap,dont_appraise,dont_measure,subj_type=,dont_measure,fscontext=system_u,fsmagic=0x000000000000008c,uid=', @ANYRESDEC=r2, @ANYBLOB="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"]) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000002c0)={{0x1, 0x0, 0x0, r2, 0x0, 0x39, 0x8}, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7}) r3 = semget$private(0x0, 0x4000, 0x0) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000340)=""/99) semctl$IPC_RMID(r3, 0x0, 0x0) r4 = semget(0x2, 0x0, 0x20b) r5 = getuid() stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f00000002c0)={{0x1, r5, r1, r6, 0x0, 0x39, 0x8}, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000280), 0x20000, &(0x7f00000003c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@loose}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}}) semtimedop(r4, &(0x7f0000000080)=[{0x0, 0x4, 0x1000}], 0x1, &(0x7f0000000100)={r7, r8+10000000}) semctl$SEM_INFO(0x0, 0x935a4533181df21f, 0x13, &(0x7f0000001e00)=""/4096) semctl$SEM_INFO(r0, 0x3, 0x13, &(0x7f0000000000)=""/35) unshare(0x48020200) 18:58:59 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000700)='uid_map\x00') sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x40000) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={&(0x7f0000000440), 0x1}, 0xd10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x100000000000}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x20) fallocate(r1, 0x0, 0x0, 0x1000002) ftruncate(0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x105142, 0x0) lseek(r2, 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000500)=ANY=[@ANYBLOB="1c00000024000100815f000000000000000000000600040000c67a8b091874e962e2bdfc97930000000000"], 0x1c}}, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r3, 0xf501, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) fstat(r2, 0x0) sendfile(r2, r4, 0x0, 0x100000001) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f00000002c0)=0xc) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x200, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r6, r7, 0x1000) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@debug={'debug', 0x3d, 0x2}}, {@afid={'afid', 0x3d, 0x3d6fe54e}}], [{@seclabel}, {@subj_type={'subj_type', 0x3d, 'uid_map\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x7}}, {@smackfstransmute={'smackfstransmute', 0x3d, '@*'}}, {@uid_gt={'uid>', r5}}, {@fowner_eq={'fowner', 0x3d, r6}}, {@subj_role={'subj_role', 0x3d, 'uid_map\x00'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@uid_lt}]}}) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x141200, 0xab) [ 631.387493] FAULT_INJECTION: forcing a failure. [ 631.387493] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 631.390323] CPU: 1 PID: 6093 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 631.391769] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 631.393636] Call Trace: [ 631.394389] dump_stack+0x107/0x167 [ 631.395165] should_fail.cold+0x5/0xa [ 631.395978] strncpy_from_user+0x34/0x470 [ 631.396855] getname_flags.part.0+0x95/0x4f0 [ 631.397789] getname+0x8e/0xd0 [ 631.398503] do_sys_openat2+0xf9/0x4d0 [ 631.399326] ? build_open_flags+0x6f0/0x6f0 [ 631.400232] ? __mutex_unlock_slowpath+0xe1/0x600 [ 631.401259] ? wait_for_completion_io+0x270/0x270 [ 631.402318] __x64_sys_openat+0x13f/0x1f0 [ 631.403183] ? __ia32_sys_open+0x1c0/0x1c0 [ 631.404076] ? ksys_write+0x1a9/0x260 [ 631.404891] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 631.405994] ? syscall_enter_from_user_mode+0x1d/0x50 [ 631.407103] do_syscall_64+0x33/0x40 [ 631.407876] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 631.408946] RIP: 0033:0x7ff27c0cdb19 [ 631.409731] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 631.413648] RSP: 002b:00007ff279643188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 631.415293] RAX: ffffffffffffffda RBX: 00007ff27c1e0f60 RCX: 00007ff27c0cdb19 [ 631.416817] RDX: 0000000000105142 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 631.418365] RBP: 00007ff2796431d0 R08: 0000000000000000 R09: 0000000000000000 [ 631.419878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 631.421648] R13: 00007ffe2ad57a7f R14: 00007ff279643300 R15: 0000000000022000 18:58:59 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:58:59 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x0) 18:58:59 executing program 4: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 18:58:59 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x30) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 18:58:59 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 631.540880] 9pnet: Insufficient options for proto=fd 18:58:59 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) (fail_nth: 4) 18:58:59 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r0, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r0, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x40, 0x100) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2e, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000001000008000000d2420000120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e33323937363736343400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000def361b116dd4bb681391964ccf077da010040000c00000000000000d0f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000003700000000000000", 0x40, 0x540}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010500)="ff030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d0f4655fd0f4655fd0f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d0f4655fd2f4655fd2f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000010f00)="20000000100de17a100de17a00000000d0f4655f00"/32, 0x20, 0x1580}, {&(0x7f0000011000)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000300000000200000004000000320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000d0f4655f00"/160, 0xa0, 0x1600}, {&(0x7f0000011100)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000400000000200000004000000420000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000d0f4655f00"/160, 0xa0, 0x1700}, {&(0x7f0000011200)="c041000000300000d0f4655fd0f4655fd0f4655f00000000000002002000000000000800000000000af301000400000000000000000000000c00000020000000", 0x40, 0x1e00}, {&(0x7f0000011300)="20000000000000000000000000000000d0f4655f00"/32, 0x20, 0x1e80}, {&(0x7f0000011400)="ed41000000040000d2f4655fd2f4655fd2f4655f00000000000002002000000000000800030000000af3010004000000000000000000000001000000500000000000000000000000000000000000000000000000000000000000000000000000000000003f81d1a200000000000000000000000000000000000000000000000020000000100de17a100de17a100de17ad2f4655f100de17a0000000000000000", 0xa0, 0x1f00}, {&(0x7f0000011500)="ed8100001a040000d2f4655fd2f4655fd2f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000600000000000000000000000000000000000000000000000000000000000000000000000000000009caef32e00000000000000000000000000000000000000000000000020000000100de17a100de17a100de17ad2f4655f100de17a0000000000000000", 0xa0, 0x2000}, {&(0x7f0000011600)="ffa1000026000000d2f4655fd2f4655fd2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3332393736373634342f66696c65302f66696c6530000000000000000000000000000000000000000000000ae0cdf100000000000000000000000000000000000000000000000020000000100de17a100de17a100de17ad2f4655f100de17a0000000000000000", 0xa0, 0x2100}, {&(0x7f0000011700)="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", 0x1a0, 0x2200}, {&(0x7f0000011900)="ed81000064000000d2f4655fd2f4655fd2f4655f00000000000001002000000000000800010000000af3010004000000000000000000000001000000900000000000000000000000000000000000000000000000000000000000000000000000000000008880d39500000000000000000000000000000000000000000000000020000000100de17a100de17a100de17ad2f4655f100de17a0000000000000000", 0xa0, 0x2400}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009403090166696c652e636f6c64000000", 0x80, 0x4000}, {&(0x7f0000011b00)="0b0000000c0001022e00000002000000f40302022e2e00"/32, 0x20, 0x8000}, {&(0x7f0000011c00)="00000000000400"/32, 0x20, 0x8400}, {&(0x7f0000011d00)="00000000000400"/32, 0x20, 0x8800}, {&(0x7f0000011e00)="00000000000400"/32, 0x20, 0x8c00}, {&(0x7f0000011f00)="00000000000400"/32, 0x20, 0x9000}, {&(0x7f0000012000)="00000000000400"/32, 0x20, 0x9400}, {&(0x7f0000012100)="00000000000400"/32, 0x20, 0x9800}, {&(0x7f0000012200)="00000000000400"/32, 0x20, 0x9c00}, {&(0x7f0000012300)="00000000000400"/32, 0x20, 0xa000}, {&(0x7f0000012400)="00000000000400"/32, 0x20, 0xa400}, {&(0x7f0000012500)="00000000000400"/32, 0x20, 0xa800}, {&(0x7f0000012600)="00000000000400"/32, 0x20, 0xac00}, {&(0x7f0000012700)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0xc000}, {&(0x7f0000012800)="0200"/32, 0x20, 0xc400}, {&(0x7f0000012900)="0300"/32, 0x20, 0xc800}, {&(0x7f0000012a00)="0400"/32, 0x20, 0xcc00}, {&(0x7f0000012b00)="0500"/32, 0x20, 0xd000}, {&(0x7f0000012c00)="0000000000000000010000000000000000000000e925f2be0000000000000000000000000000000008000000000000000000000000000000000000000000000000c00100"/96, 0x60, 0xd400}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x10000}, {&(0x7f0000012e00)="0200"/32, 0x20, 0x10400}, {&(0x7f0000012f00)="0300"/32, 0x20, 0x10800}, {&(0x7f0000013000)="0400"/32, 0x20, 0x10c00}, {&(0x7f0000013100)="0500"/32, 0x20, 0x11000}, {&(0x7f0000013200)="0000000000000000010000000000000000000000e925f2be0000000000000000000000000000000008000000000000000000000000000000000000000000000000c00100"/96, 0x60, 0x11400}, {&(0x7f0000013300)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d803050766696c653100"/64, 0x40, 0x14000}, {&(0x7f0000013400)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x18000}, {&(0x7f0000013900)='syzkallers\x00'/32, 0x20, 0x1c000}, {&(0x7f0000013a00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x24000}], 0x0, &(0x7f0000013b00)) [ 631.689207] FAULT_INJECTION: forcing a failure. [ 631.689207] name failslab, interval 1, probability 0, space 0, times 0 [ 631.690710] CPU: 0 PID: 6111 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 631.691606] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 631.692709] Call Trace: [ 631.693060] dump_stack+0x107/0x167 [ 631.693540] should_fail.cold+0x5/0xa [ 631.694036] ? __alloc_file+0x21/0x320 [ 631.694558] should_failslab+0x5/0x20 [ 631.695069] kmem_cache_alloc+0x5b/0x310 [ 631.695608] __alloc_file+0x21/0x320 [ 631.696093] alloc_empty_file+0x6d/0x170 [ 631.696625] path_openat+0xe6/0x2770 [ 631.697114] ? __lock_acquire+0x1657/0x5b00 [ 631.697694] ? path_lookupat+0x860/0x860 [ 631.698236] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 631.698926] ? lock_acquire+0x197/0x470 [ 631.699422] ? find_held_lock+0x2c/0x110 [ 631.699961] do_filp_open+0x190/0x3e0 [ 631.700466] ? may_open_dev+0xf0/0xf0 [ 631.700965] ? alloc_fd+0x2e7/0x670 [ 631.701444] ? lock_downgrade+0x6d0/0x6d0 [ 631.701984] ? do_raw_spin_lock+0x121/0x260 [ 631.702549] ? rwlock_bug.part.0+0x90/0x90 [ 631.703110] ? _raw_spin_unlock+0x1a/0x30 [ 631.703645] ? alloc_fd+0x2e7/0x670 [ 631.704121] do_sys_openat2+0x171/0x4d0 [ 631.704613] ? build_open_flags+0x6f0/0x6f0 [ 631.705173] ? __mutex_unlock_slowpath+0xe1/0x600 [ 631.705806] ? wait_for_completion_io+0x270/0x270 [ 631.706451] __x64_sys_openat+0x13f/0x1f0 [ 631.707000] ? __ia32_sys_open+0x1c0/0x1c0 [ 631.707548] ? ksys_write+0x1a9/0x260 [ 631.708047] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 631.708733] ? syscall_enter_from_user_mode+0x1d/0x50 [ 631.709369] do_syscall_64+0x33/0x40 [ 631.709852] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 631.710488] RIP: 0033:0x7ff27c0cdb19 [ 631.710979] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 631.713233] RSP: 002b:00007ff279643188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 631.714241] RAX: ffffffffffffffda RBX: 00007ff27c1e0f60 RCX: 00007ff27c0cdb19 [ 631.715180] RDX: 0000000000105142 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 631.716103] RBP: 00007ff2796431d0 R08: 0000000000000000 R09: 0000000000000000 [ 631.717019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 631.717938] R13: 00007ffe2ad57a7f R14: 00007ff279643300 R15: 0000000000022000 18:59:00 executing program 4: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 18:59:00 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 631.779874] loop6: detected capacity change from 0 to 524288 18:59:00 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) (fail_nth: 5) 18:59:00 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 18:59:00 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x30) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 631.909081] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 18:59:00 executing program 4: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 18:59:00 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 631.963773] FAULT_INJECTION: forcing a failure. [ 631.963773] name failslab, interval 1, probability 0, space 0, times 0 [ 631.965179] CPU: 0 PID: 6128 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 631.965963] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 631.966927] Call Trace: [ 631.967233] dump_stack+0x107/0x167 [ 631.967655] should_fail.cold+0x5/0xa [ 631.968095] ? create_object.isra.0+0x3a/0xa20 [ 631.968590] should_failslab+0x5/0x20 [ 631.969028] kmem_cache_alloc+0x5b/0x310 [ 631.969469] create_object.isra.0+0x3a/0xa20 [ 631.969970] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 631.970530] kmem_cache_alloc+0x159/0x310 [ 631.971005] __alloc_file+0x21/0x320 [ 631.971432] alloc_empty_file+0x6d/0x170 [ 631.971897] path_openat+0xe6/0x2770 [ 631.972318] ? __lock_acquire+0x1657/0x5b00 [ 631.972817] ? path_lookupat+0x860/0x860 [ 631.973286] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 631.973882] ? lock_acquire+0x197/0x470 [ 631.974320] ? find_held_lock+0x2c/0x110 [ 631.974794] do_filp_open+0x190/0x3e0 [ 631.975228] ? may_open_dev+0xf0/0xf0 [ 631.975641] ? alloc_fd+0x2e7/0x670 [ 631.976064] ? lock_downgrade+0x6d0/0x6d0 [ 631.976534] ? do_raw_spin_lock+0x121/0x260 [ 631.977028] ? rwlock_bug.part.0+0x90/0x90 [ 631.977520] ? _raw_spin_unlock+0x1a/0x30 [ 631.977995] ? alloc_fd+0x2e7/0x670 [ 631.978400] do_sys_openat2+0x171/0x4d0 [ 631.978857] ? build_open_flags+0x6f0/0x6f0 [ 631.979347] ? __mutex_unlock_slowpath+0xe1/0x600 [ 631.979898] ? wait_for_completion_io+0x270/0x270 [ 631.980422] __x64_sys_openat+0x13f/0x1f0 [ 631.980897] ? __ia32_sys_open+0x1c0/0x1c0 [ 631.981383] ? ksys_write+0x1a9/0x260 [ 631.981800] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 631.982413] ? syscall_enter_from_user_mode+0x1d/0x50 [ 631.982975] do_syscall_64+0x33/0x40 [ 631.983402] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 631.983959] RIP: 0033:0x7ff27c0cdb19 [ 631.984384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 631.986357] RSP: 002b:00007ff279643188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 631.987232] RAX: ffffffffffffffda RBX: 00007ff27c1e0f60 RCX: 00007ff27c0cdb19 [ 631.988058] RDX: 0000000000105142 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 631.988883] RBP: 00007ff2796431d0 R08: 0000000000000000 R09: 0000000000000000 [ 631.989695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 631.990514] R13: 00007ffe2ad57a7f R14: 00007ff279643300 R15: 0000000000022000 18:59:13 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 18:59:13 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:59:13 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) (fail_nth: 6) 18:59:13 executing program 2: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:59:13 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 18:59:13 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) (fail_nth: 1) 18:59:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x30) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 18:59:13 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000072a8db2bc2b963782f6de51160edb819098408e1ed66bf39087af6e10d6d8aae3b4352bc4781aa9171f2d33b5d96aeb78297cbfda2096ccfaec75ade323a98", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYBLOB='./nile0f']) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(r0, 0x80106720, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) preadv(r2, &(0x7f0000000b80)=[{&(0x7f0000000400)=""/150, 0x96}, {&(0x7f00000007c0)=""/215, 0xd7}, {&(0x7f00000008c0)=""/193, 0xc1}, {&(0x7f00000002c0)=""/124, 0x7c}, {&(0x7f00000009c0)=""/247, 0xf7}, {&(0x7f0000000240)=""/43, 0x2b}, {&(0x7f00000005c0)=""/157, 0x9d}, {&(0x7f0000000ac0)=""/82, 0x52}, {&(0x7f0000000380)=""/11, 0xb}, {&(0x7f0000000b40)=""/51, 0x33}], 0xa, 0x3f, 0x6) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="240080001000010000000000000000050000804800"/36], 0x24}}, 0x24000000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000c40), 0x30a00, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) dup(r2) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x80202, 0x100) pwrite64(0xffffffffffffffff, &(0x7f0000000fc0)="ce072423fd3b3186a5ea6459d951dc5ce5f4dee5be4711679b0cbc5c899da827ee29b96963f47539c455806fcdf82e6373ea1abb06affcc61010c80bfd24f27e369461422006dd19ab0d6cbabc6cd93ac84eb08fd2555bb93ce83b2d48c66509c78bd63957fb2f2181e70b859605a564ad1a6ed640647dce8ac8943f5a", 0x7d, 0x4) r6 = signalfd(r5, &(0x7f00000003c0)={[0x1]}, 0x8) fcntl$setstatus(r6, 0x4, 0x46800) openat(r3, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x102) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x1, 0x4) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 645.561321] FAULT_INJECTION: forcing a failure. [ 645.561321] name failslab, interval 1, probability 0, space 0, times 0 [ 645.563774] CPU: 1 PID: 6150 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 645.565220] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 645.566969] Call Trace: [ 645.567732] dump_stack+0x107/0x167 [ 645.568590] should_fail.cold+0x5/0xa [ 645.569647] ? security_file_alloc+0x34/0x170 [ 645.570599] should_failslab+0x5/0x20 [ 645.571402] kmem_cache_alloc+0x5b/0x310 [ 645.572254] security_file_alloc+0x34/0x170 [ 645.573323] __alloc_file+0xb7/0x320 [ 645.574304] alloc_empty_file+0x6d/0x170 [ 645.575287] path_openat+0xe6/0x2770 [ 645.576066] ? __lock_acquire+0x1657/0x5b00 [ 645.576977] ? path_lookupat+0x860/0x860 [ 645.577834] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 645.578943] ? lock_acquire+0x197/0x470 [ 645.579776] ? find_held_lock+0x2c/0x110 [ 645.580783] do_filp_open+0x190/0x3e0 [ 645.581666] ? may_open_dev+0xf0/0xf0 [ 645.582720] ? alloc_fd+0x2e7/0x670 [ 645.583482] ? lock_downgrade+0x6d0/0x6d0 [ 645.584348] ? do_raw_spin_lock+0x121/0x260 [ 645.585252] ? rwlock_bug.part.0+0x90/0x90 [ 645.586148] ? _raw_spin_unlock+0x1a/0x30 [ 645.587024] ? alloc_fd+0x2e7/0x670 [ 645.587793] do_sys_openat2+0x171/0x4d0 [ 645.588628] ? build_open_flags+0x6f0/0x6f0 [ 645.589526] ? __mutex_unlock_slowpath+0xe1/0x600 [ 645.590553] ? wait_for_completion_io+0x270/0x270 [ 645.591570] __x64_sys_openat+0x13f/0x1f0 [ 645.592441] ? __ia32_sys_open+0x1c0/0x1c0 [ 645.593431] ? ksys_write+0x1a9/0x260 [ 645.594331] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 645.595767] ? syscall_enter_from_user_mode+0x1d/0x50 [ 645.596854] do_syscall_64+0x33/0x40 [ 645.597634] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 645.598719] RIP: 0033:0x7ff27c0cdb19 [ 645.599493] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 645.603358] RSP: 002b:00007ff279643188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 645.604949] RAX: ffffffffffffffda RBX: 00007ff27c1e0f60 RCX: 00007ff27c0cdb19 [ 645.606448] RDX: 0000000000105142 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 645.607946] RBP: 00007ff2796431d0 R08: 0000000000000000 R09: 0000000000000000 [ 645.609685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 645.611442] R13: 00007ffe2ad57a7f R14: 00007ff279643300 R15: 0000000000022000 [ 645.614092] FAULT_INJECTION: forcing a failure. [ 645.614092] name failslab, interval 1, probability 0, space 0, times 0 [ 645.616493] CPU: 1 PID: 6154 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 645.617923] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 645.619688] Call Trace: [ 645.620238] dump_stack+0x107/0x167 [ 645.621001] should_fail.cold+0x5/0xa [ 645.621798] ? getname_flags.part.0+0x50/0x4f0 [ 645.622759] should_failslab+0x5/0x20 [ 645.623551] kmem_cache_alloc+0x5b/0x310 [ 645.624402] getname_flags.part.0+0x50/0x4f0 [ 645.625531] getname+0x8e/0xd0 [ 645.626386] do_sys_openat2+0xf9/0x4d0 [ 645.627335] ? build_open_flags+0x6f0/0x6f0 [ 645.628248] ? wait_for_completion_io+0x270/0x270 [ 645.629257] ? rcu_read_lock_any_held+0x75/0xa0 [ 645.630241] ? vfs_write+0x354/0xb10 [ 645.631029] __x64_sys_creat+0xc9/0x120 [ 645.631865] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 645.632909] ? __ia32_sys_read+0xb0/0xb0 [ 645.633775] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 645.634886] ? syscall_enter_from_user_mode+0x1d/0x50 [ 645.635961] ? trace_hardirqs_on+0x5b/0x180 [ 645.636866] do_syscall_64+0x33/0x40 [ 645.637649] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 645.638732] RIP: 0033:0x7fcf914ffb19 [ 645.639504] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 645.643385] RSP: 002b:00007fcf8ea75188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 645.644982] RAX: ffffffffffffffda RBX: 00007fcf91612f60 RCX: 00007fcf914ffb19 [ 645.646490] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 645.647993] RBP: 00007fcf8ea751d0 R08: 0000000000000000 R09: 0000000000000000 [ 645.649690] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 645.651490] R13: 00007ffd78c3ee2f R14: 00007fcf8ea75300 R15: 0000000000022000 18:59:13 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) (fail_nth: 7) 18:59:13 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(0x0, 0x0) 18:59:14 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r1 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r2 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r1}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r2}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:59:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x30) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 18:59:14 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 18:59:14 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) (fail_nth: 2) 18:59:14 executing program 6: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x2042, 0x0, 0xfffffeff, 0x7, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_LOCK(0x0, 0xb) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000001400)=""/226) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000012c0)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = shmget$private(0x0, 0x3000, 0x78000000, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x1ff) r1 = shmget$private(0x0, 0x3000, 0x80, &(0x7f0000ffc000/0x3000)=nil) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x4000) shmat(r1, &(0x7f0000ffc000/0x2000)=nil, 0x6000) shmctl$SHM_LOCK(r1, 0xb) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000001300)=""/239) shmat(r0, &(0x7f0000ffb000/0x2000)=nil, 0x2000) shmctl$SHM_UNLOCK(0x0, 0xc) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000100)=""/182) shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f00000000c0)=""/22) 18:59:14 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10112, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xd3}, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f00000002c0)=0x2b) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000040)=""/102, 0x66}, {&(0x7f00000000c0)=""/82, 0x52}, {&(0x7f0000000140)=""/250, 0xfa}, {&(0x7f0000000240)=""/33, 0x21}], 0x4) pkey_alloc(0x0, 0x0) r1 = pkey_alloc(0x0, 0x5) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r2 = creat(&(0x7f0000000000)='./file1\x00', 0x88ab470809e5749e) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000380)=""/81, 0x51}, {&(0x7f0000000400)=""/191, 0xbf}, {&(0x7f00000004c0)=""/85, 0x55}], 0x3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)) fallocate(r2, 0x0, 0x0, 0x8800000) [ 645.822767] FAULT_INJECTION: forcing a failure. [ 645.822767] name failslab, interval 1, probability 0, space 0, times 0 [ 645.825621] CPU: 1 PID: 6168 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 645.827044] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 645.829176] Call Trace: [ 645.829719] dump_stack+0x107/0x167 [ 645.830471] should_fail.cold+0x5/0xa [ 645.831248] ? create_object.isra.0+0x3a/0xa20 [ 645.832213] should_failslab+0x5/0x20 [ 645.833075] kmem_cache_alloc+0x5b/0x310 [ 645.833899] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 645.835031] create_object.isra.0+0x3a/0xa20 [ 645.836059] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 645.837193] kmem_cache_alloc+0x159/0x310 [ 645.838261] security_file_alloc+0x34/0x170 [ 645.839130] __alloc_file+0xb7/0x320 [ 645.839881] alloc_empty_file+0x6d/0x170 [ 645.840702] path_openat+0xe6/0x2770 [ 645.841456] ? __lock_acquire+0x1657/0x5b00 [ 645.842351] ? path_lookupat+0x860/0x860 [ 645.843180] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 645.844407] ? lock_acquire+0x197/0x470 [ 645.845397] ? find_held_lock+0x2c/0x110 [ 645.846316] do_filp_open+0x190/0x3e0 [ 645.847077] ? may_open_dev+0xf0/0xf0 [ 645.847844] ? alloc_fd+0x2e7/0x670 [ 645.848569] ? lock_downgrade+0x6d0/0x6d0 [ 645.849391] ? do_raw_spin_lock+0x121/0x260 [ 645.850256] ? rwlock_bug.part.0+0x90/0x90 [ 645.851116] ? _raw_spin_unlock+0x1a/0x30 [ 645.851937] ? alloc_fd+0x2e7/0x670 [ 645.852877] do_sys_openat2+0x171/0x4d0 [ 645.853820] ? build_open_flags+0x6f0/0x6f0 [ 645.854912] ? __mutex_unlock_slowpath+0xe1/0x600 [ 645.855877] ? wait_for_completion_io+0x270/0x270 [ 645.856843] __x64_sys_openat+0x13f/0x1f0 [ 645.857670] ? __ia32_sys_open+0x1c0/0x1c0 [ 645.858528] ? ksys_write+0x1a9/0x260 [ 645.859304] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 645.860351] ? syscall_enter_from_user_mode+0x1d/0x50 [ 645.861387] do_syscall_64+0x33/0x40 [ 645.862130] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 645.863161] RIP: 0033:0x7ff27c0cdb19 [ 645.863902] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 645.867590] RSP: 002b:00007ff279643188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 645.869115] RAX: ffffffffffffffda RBX: 00007ff27c1e0f60 RCX: 00007ff27c0cdb19 [ 645.870550] RDX: 0000000000105142 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 645.871972] RBP: 00007ff2796431d0 R08: 0000000000000000 R09: 0000000000000000 [ 645.873386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 645.874816] R13: 00007ffe2ad57a7f R14: 00007ff279643300 R15: 0000000000022000 18:59:14 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(0x0, 0x0) [ 645.961739] FAULT_INJECTION: forcing a failure. [ 645.961739] name failslab, interval 1, probability 0, space 0, times 0 [ 645.964146] CPU: 0 PID: 6175 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 645.965584] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 645.967328] Call Trace: [ 645.967882] dump_stack+0x107/0x167 [ 645.968651] should_fail.cold+0x5/0xa [ 645.969452] ? create_object.isra.0+0x3a/0xa20 [ 645.970417] should_failslab+0x5/0x20 [ 645.971212] kmem_cache_alloc+0x5b/0x310 [ 645.972069] create_object.isra.0+0x3a/0xa20 [ 645.972987] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 645.974051] kmem_cache_alloc+0x159/0x310 [ 645.974928] getname_flags.part.0+0x50/0x4f0 [ 645.975852] getname+0x8e/0xd0 [ 645.976529] do_sys_openat2+0xf9/0x4d0 [ 645.977356] ? build_open_flags+0x6f0/0x6f0 [ 645.978267] ? wait_for_completion_io+0x270/0x270 [ 645.979281] ? rcu_read_lock_any_held+0x75/0xa0 [ 645.980252] ? vfs_write+0x354/0xb10 [ 645.981035] __x64_sys_creat+0xc9/0x120 [ 645.981884] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 645.982938] ? __ia32_sys_read+0xb0/0xb0 [ 645.983799] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 645.984907] ? syscall_enter_from_user_mode+0x1d/0x50 [ 645.985984] ? trace_hardirqs_on+0x5b/0x180 [ 645.986904] do_syscall_64+0x33/0x40 [ 645.987693] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 645.988774] RIP: 0033:0x7fcf914ffb19 [ 645.989551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 645.993405] RSP: 002b:00007fcf8ea75188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 645.995006] RAX: ffffffffffffffda RBX: 00007fcf91612f60 RCX: 00007fcf914ffb19 [ 645.996500] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 645.998000] RBP: 00007fcf8ea751d0 R08: 0000000000000000 R09: 0000000000000000 [ 645.999504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 646.001004] R13: 00007ffd78c3ee2f R14: 00007fcf8ea75300 R15: 0000000000022000 18:59:27 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) (fail_nth: 8) 18:59:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x30) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 18:59:27 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040), &(0x7f0000000000)='system_u:object_r:initrc_exec_t:s0\x00', 0x23, 0x1) 18:59:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x102) execveat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00', &(0x7f00000003c0)='wlan0\x00', &(0x7f0000000180)='\xd7,+[-&@\x00', &(0x7f0000000c40)='\x9c)Q#\x18?\xe1\x9d\xf8\xb6\x04\x9d\x9c\xd2\xa0\x012\x80\x8d\x83\x8d\x8d\x03\x11\xc7\xbd\xa4o\xafo\x85F\xcd\xd1\xce\x94U\x9e\xfe\xa0\x14\xa8\xb03:\xc7\xe2\xb7\xc4ux\xef7\x0f$\xf2\xe1\x98\xcb\x0e\x02\xe7=I[Bb\x86\xd3\x11\xd0\x18CS\x8euz_;\f\xdf\xa2,\x0etQ\xbc\xa8\x951=\xb2\x99v\x1d\xee\x14\xe4\xa1<+\ni&8\x1f\xc7\x8a\xcf\x90\x9e\x96\xef\xfarB\xc3\x13\f\x06\xe6X\x06\xece\x8c\x8b\x84X\x97\x03)\xdd\x9cf0V\x8cN\xab\xef\xfe\x87Q_\xaa\x9eT>\x02\xf5\xb7M\xcev\x1f\xda)V\x8a\xb9\xae\x187l\xf7t\xab\xe2\x15a\x95u^!\xa5\xfbbq\xa34\xacc1\xf2\xb2im\xfe\x15\xb0\x9d\xb0L\x99\x01k,\xc6u\xefn\x03\x17\xa1\xdc:\xf5)x\xa6\x85z\xfa\x8a2\x93/\xc0\xbe\xf2\xf3\x97\xa8\xb8-,\xf1\x87\xd1\xf9\xf4\xb9\xad\xa7\x96#\xcf\x9b\xbaI\xa5\xc6n\xc6[\xb7?\xd7\xa0\x0e\x93%@{\xce\xbf\x91]\xf4\x9d\x9a\xd9\xa1b\x8fF\xbb\xa6\xf9\x93\xa3\xc7\'\\\x95\x06\\\xcf\xf5o\xec'], &(0x7f0000000440), 0x1000) fallocate(0xffffffffffffffff, 0x78, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010e0100000000be72000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ftruncate(r0, 0x1000003) preadv(r0, &(0x7f0000000400), 0x0, 0x1, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x8, 0x2, 0x400, 0x3, 0x2, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) clone3(&(0x7f0000000740)={0x40092340, &(0x7f0000000480)=0xffffffffffffffff, &(0x7f00000004c0), &(0x7f0000000500), {0x34}, &(0x7f0000000540)=""/201, 0xc9, 0x0, &(0x7f0000000700)}, 0x58) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f00000007c0)={0xfffffffd, 0x81, 0x667, 0x3f, 0x8}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000640)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="0000000003002e2f666908000400c04326c01c3f9797913fe1ceec1e66493e024c1e99ce53f8010535191412c2c9f6e969b949231b7cdb48ae050067e06c099db71a710ba2d5b9d64345202f73dbb8114249789a14c1219a75884e9d734e6ee4e5eb9e92b6acbf6a0c3bcc448000000000000000"]) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000008, 0x8010, r3, 0xece17000) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth1_to_bridge\x00'}) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r3, 0x89f5, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000880)={'ip6tnl0\x00', 0x0, 0x2f, 0x81, 0x2, 0x4c93, 0x0, @dev={0xfe, 0x80, '\x00', 0x17}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x40, 0x10, 0x9, 0xec}}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 18:59:27 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) (fail_nth: 3) 18:59:27 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 18:59:27 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(0x0, 0x0) 18:59:27 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r1 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r2 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r1}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r2}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:59:27 executing program 2: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x440000) r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = dup(r1) setns(r2, 0x2020000) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x8d) [ 658.927606] FAULT_INJECTION: forcing a failure. [ 658.927606] name failslab, interval 1, probability 0, space 0, times 0 [ 658.930818] CPU: 1 PID: 6209 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 658.932240] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 658.933948] Call Trace: [ 658.934517] dump_stack+0x107/0x167 [ 658.935294] should_fail.cold+0x5/0xa [ 658.936089] ? __d_alloc+0x2a/0x990 [ 658.936858] should_failslab+0x5/0x20 [ 658.937670] kmem_cache_alloc+0x5b/0x310 [ 658.938540] __d_alloc+0x2a/0x990 [ 658.939286] d_alloc_parallel+0x111/0x1bc0 [ 658.940154] ? __d_lookup+0x396/0x760 [ 658.940956] ? lock_downgrade+0x6d0/0x6d0 [ 658.941803] ? find_held_lock+0x2c/0x110 [ 658.942671] ? __d_lookup_rcu+0x6d0/0x6d0 [ 658.943516] ? __d_lookup+0x3bf/0x760 [ 658.944301] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 658.945426] lookup_open.isra.0+0x962/0x1270 [ 658.946329] ? vfs_tmpfile+0x350/0x350 [ 658.947169] path_openat+0x972/0x2770 [ 658.947962] ? path_lookupat+0x860/0x860 [ 658.948812] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 658.949915] ? lock_acquire+0x197/0x470 [ 658.950794] ? find_held_lock+0x2c/0x110 [ 658.951695] do_filp_open+0x190/0x3e0 [ 658.952521] ? may_open_dev+0xf0/0xf0 [ 658.953356] ? do_raw_spin_lock+0x121/0x260 [ 658.954292] ? rwlock_bug.part.0+0x90/0x90 [ 658.955235] ? _raw_spin_unlock+0x1a/0x30 [ 658.956137] ? alloc_fd+0x2e7/0x670 [ 658.956938] do_sys_openat2+0x171/0x4d0 [ 658.957803] ? build_open_flags+0x6f0/0x6f0 [ 658.958747] ? __mutex_unlock_slowpath+0xe1/0x600 [ 658.959797] ? wait_for_completion_io+0x270/0x270 [ 658.960850] __x64_sys_openat+0x13f/0x1f0 [ 658.961751] ? __ia32_sys_open+0x1c0/0x1c0 [ 658.962675] ? ksys_write+0x1a9/0x260 [ 658.963510] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 658.964646] ? syscall_enter_from_user_mode+0x1d/0x50 [ 658.965768] do_syscall_64+0x33/0x40 [ 658.966585] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 658.967699] RIP: 0033:0x7ff27c0cdb19 [ 658.968670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 658.973016] RSP: 002b:00007ff279643188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 658.974887] RAX: ffffffffffffffda RBX: 00007ff27c1e0f60 RCX: 00007ff27c0cdb19 [ 658.976434] RDX: 0000000000105142 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 658.977998] RBP: 00007ff2796431d0 R08: 0000000000000000 R09: 0000000000000000 [ 658.979886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 658.981437] R13: 00007ffe2ad57a7f R14: 00007ff279643300 R15: 0000000000022000 [ 658.985295] FAULT_INJECTION: forcing a failure. [ 658.985295] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 658.987867] CPU: 1 PID: 6213 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 658.989359] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 658.991170] Call Trace: [ 658.991742] dump_stack+0x107/0x167 [ 658.992534] should_fail.cold+0x5/0xa [ 658.993657] strncpy_from_user+0x34/0x470 [ 658.994551] getname_flags.part.0+0x95/0x4f0 [ 658.995655] getname+0x8e/0xd0 [ 658.996353] do_sys_openat2+0xf9/0x4d0 [ 658.997201] ? build_open_flags+0x6f0/0x6f0 [ 658.998137] ? wait_for_completion_io+0x270/0x270 [ 658.999200] ? rcu_read_lock_any_held+0x75/0xa0 [ 659.000208] ? vfs_write+0x354/0xb10 [ 659.001020] __x64_sys_creat+0xc9/0x120 [ 659.001887] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 659.002979] ? __ia32_sys_read+0xb0/0xb0 [ 659.003864] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 659.005007] ? syscall_enter_from_user_mode+0x1d/0x50 [ 659.006119] ? trace_hardirqs_on+0x5b/0x180 [ 659.007069] do_syscall_64+0x33/0x40 [ 659.007875] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 659.008983] RIP: 0033:0x7fcf914ffb19 [ 659.009789] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 659.013916] RSP: 002b:00007fcf8ea75188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 659.015579] RAX: ffffffffffffffda RBX: 00007fcf91612f60 RCX: 00007fcf914ffb19 [ 659.017129] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 659.018700] RBP: 00007fcf8ea751d0 R08: 0000000000000000 R09: 0000000000000000 [ 659.020553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 659.022122] R13: 00007ffd78c3ee2f R14: 00007fcf8ea75300 R15: 0000000000022000 18:59:27 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) (fail_nth: 9) 18:59:27 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) (fail_nth: 1) [ 659.144489] FAULT_INJECTION: forcing a failure. [ 659.144489] name failslab, interval 1, probability 0, space 0, times 0 [ 659.146950] CPU: 1 PID: 6222 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 659.148419] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 659.150174] Call Trace: [ 659.150753] dump_stack+0x107/0x167 [ 659.151533] should_fail.cold+0x5/0xa [ 659.152349] ? create_object.isra.0+0x3a/0xa20 [ 659.153346] should_failslab+0x5/0x20 [ 659.154158] kmem_cache_alloc+0x5b/0x310 [ 659.155227] create_object.isra.0+0x3a/0xa20 [ 659.156175] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 659.157459] kmem_cache_alloc+0x159/0x310 [ 659.158393] __d_alloc+0x2a/0x990 [ 659.159271] d_alloc_parallel+0x111/0x1bc0 [ 659.160249] ? __d_lookup+0x396/0x760 [ 659.161212] ? lock_downgrade+0x6d0/0x6d0 [ 659.162103] ? find_held_lock+0x2c/0x110 [ 659.162984] ? __d_lookup_rcu+0x6d0/0x6d0 [ 659.163874] ? __d_lookup+0x3bf/0x760 [ 659.164698] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 659.165821] lookup_open.isra.0+0x962/0x1270 [ 659.166776] ? vfs_tmpfile+0x350/0x350 [ 659.167645] path_openat+0x972/0x2770 [ 659.168471] ? path_lookupat+0x860/0x860 [ 659.169341] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 659.170476] ? lock_acquire+0x197/0x470 [ 659.171318] ? find_held_lock+0x2c/0x110 [ 659.172197] do_filp_open+0x190/0x3e0 [ 659.173004] ? may_open_dev+0xf0/0xf0 [ 659.173826] ? do_raw_spin_lock+0x121/0x260 [ 659.174762] ? rwlock_bug.part.0+0x90/0x90 [ 659.175670] ? _raw_spin_unlock+0x1a/0x30 [ 659.176556] ? alloc_fd+0x2e7/0x670 [ 659.177349] do_sys_openat2+0x171/0x4d0 [ 659.178202] ? build_open_flags+0x6f0/0x6f0 [ 659.179291] ? __mutex_unlock_slowpath+0xe1/0x600 [ 659.180333] ? wait_for_completion_io+0x270/0x270 [ 659.181375] __x64_sys_openat+0x13f/0x1f0 [ 659.182262] ? __ia32_sys_open+0x1c0/0x1c0 [ 659.183173] ? ksys_write+0x1a9/0x260 [ 659.183998] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 659.185109] ? syscall_enter_from_user_mode+0x1d/0x50 [ 659.186213] do_syscall_64+0x33/0x40 [ 659.187167] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 659.188257] RIP: 0033:0x7ff27c0cdb19 [ 659.189053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 659.192944] RSP: 002b:00007ff279643188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 659.194567] RAX: ffffffffffffffda RBX: 00007ff27c1e0f60 RCX: 00007ff27c0cdb19 [ 659.196096] RDX: 0000000000105142 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 659.197605] RBP: 00007ff2796431d0 R08: 0000000000000000 R09: 0000000000000000 [ 659.199126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 659.200651] R13: 00007ffe2ad57a7f R14: 00007ff279643300 R15: 0000000000022000 [ 659.205374] FAULT_INJECTION: forcing a failure. [ 659.205374] name failslab, interval 1, probability 0, space 0, times 0 [ 659.206767] CPU: 0 PID: 6224 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 659.207544] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 659.208486] Call Trace: [ 659.208794] dump_stack+0x107/0x167 [ 659.209208] should_fail.cold+0x5/0xa [ 659.209645] ? getname_flags.part.0+0x50/0x4f0 [ 659.210164] should_failslab+0x5/0x20 [ 659.210608] kmem_cache_alloc+0x5b/0x310 [ 659.211073] getname_flags.part.0+0x50/0x4f0 [ 659.211572] getname+0x8e/0xd0 [ 659.211941] do_sys_openat2+0xf9/0x4d0 [ 659.212393] ? build_open_flags+0x6f0/0x6f0 [ 659.212887] ? wait_for_completion_io+0x270/0x270 [ 659.213446] ? rcu_read_lock_any_held+0x75/0xa0 [ 659.213985] ? vfs_write+0x354/0xb10 [ 659.214423] __x64_sys_creat+0xc9/0x120 [ 659.214907] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 659.215650] ? __ia32_sys_read+0xb0/0xb0 [ 659.216120] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 659.216727] ? syscall_enter_from_user_mode+0x1d/0x50 [ 659.217315] ? trace_hardirqs_on+0x5b/0x180 [ 659.217811] do_syscall_64+0x33/0x40 [ 659.218234] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 659.218852] RIP: 0033:0x7fdebd7f1b19 [ 659.219282] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 659.221382] RSP: 002b:00007fdebad46188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 659.222253] RAX: ffffffffffffffda RBX: 00007fdebd905020 RCX: 00007fdebd7f1b19 [ 659.223079] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 659.223889] RBP: 00007fdebad461d0 R08: 0000000000000000 R09: 0000000000000000 [ 659.224703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 659.225514] R13: 00007ffce3c54b0f R14: 00007fdebad46300 R15: 0000000000022000 18:59:40 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) (fail_nth: 2) 18:59:40 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r1 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r2 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r1}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r2}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:59:40 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) (fail_nth: 10) 18:59:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x30) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 18:59:40 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 18:59:40 executing program 6: r0 = syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) close(0xffffffffffffffff) r1 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000014c0)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0xfff6, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYRES16=0x0]) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0xc1) mkdirat(r1, &(0x7f0000000380)='./file0\x00', 0x41) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x80000000}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x2) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) stat(&(0x7f00000001c0)='./file2\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r2, @ANYBLOB='3/f\x00']) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2, 0x2010, r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_io_uring_setup(0x7180, &(0x7f0000001340)={0x0, 0x0, 0x1, 0x40000001, 0xfffffffc}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000001180), &(0x7f0000000040)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=r3, @ANYRES32=0x0, @ANYBLOB='./file0\x00']) pipe2$9p(&(0x7f0000000140), 0x6000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) 18:59:40 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) (fail_nth: 4) 18:59:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e24, 0xb65, @mcast2, 0xfffffffc}, 0x1c) r1 = creat(0x0, 0x0) fcntl$addseals(r1, 0x409, 0x9) write$binfmt_elf64(r1, &(0x7f00000008c0)=ANY=[], 0x629) creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1f40c51b1b780b7b, @perf_config_ext={0x0, 0xffffffffffffffff}, 0xc000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000240)=ANY=[@ANYRES32, @ANYRES32=r2, @ANYBLOB="00000000000004002e2f6669"]) r3 = fsopen(&(0x7f00000000c0)='rpc_pipefs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r3, 0x1, 0x0, &(0x7f00000003c0)='-\xfcx{\xe6\xac\xc8\xdf\x8e;\xb4Wy\xbea\xac2@\xa7\\\x98\x1f\x9d\x00\x00\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) fsmount(r3, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c00, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000100)={0x14, 0x20, 0xc21, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x1, 0x3, 0x1}, 0x18) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="09000000000000002e2f6669c01452a7"]) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)={0x90, r5, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_MGMT_A_DOMAIN={0x5, 0x1, '\x00'}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @loopback}, @NLBL_MGMT_A_DOMAIN={0xf, 0x1, 'rpc_pipefs\x00'}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast1}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast2}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @local}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @empty}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}]}, 0x90}}, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r4) [ 672.525092] FAULT_INJECTION: forcing a failure. [ 672.525092] name failslab, interval 1, probability 0, space 0, times 0 [ 672.527969] CPU: 0 PID: 6237 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 672.529708] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 672.531828] Call Trace: [ 672.532504] dump_stack+0x107/0x167 [ 672.533432] should_fail.cold+0x5/0xa [ 672.534401] ? __alloc_file+0x21/0x320 [ 672.535401] should_failslab+0x5/0x20 [ 672.536367] kmem_cache_alloc+0x5b/0x310 [ 672.537401] __alloc_file+0x21/0x320 [ 672.538345] alloc_empty_file+0x6d/0x170 [ 672.539389] path_openat+0xe6/0x2770 [ 672.540334] ? __lock_acquire+0x1657/0x5b00 [ 672.541440] ? path_lookupat+0x860/0x860 [ 672.542477] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 672.543816] ? lock_acquire+0x197/0x470 [ 672.544823] ? find_held_lock+0x2c/0x110 [ 672.545865] do_filp_open+0x190/0x3e0 [ 672.546839] ? may_open_dev+0xf0/0xf0 [ 672.547809] ? alloc_fd+0x2e7/0x670 [ 672.548732] ? lock_downgrade+0x6d0/0x6d0 [ 672.549781] ? do_raw_spin_lock+0x121/0x260 [ 672.550882] ? rwlock_bug.part.0+0x90/0x90 [ 672.551962] ? _raw_spin_unlock+0x1a/0x30 [ 672.553010] ? alloc_fd+0x2e7/0x670 [ 672.553944] do_sys_openat2+0x171/0x4d0 [ 672.554967] ? build_open_flags+0x6f0/0x6f0 [ 672.556060] ? wait_for_completion_io+0x270/0x270 [ 672.557284] ? rcu_read_lock_any_held+0x75/0xa0 [ 672.558460] ? vfs_write+0x354/0xb10 [ 672.559422] __x64_sys_creat+0xc9/0x120 [ 672.560281] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 672.561343] ? __ia32_sys_read+0xb0/0xb0 [ 672.562213] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 672.563343] ? syscall_enter_from_user_mode+0x1d/0x50 [ 672.564439] ? trace_hardirqs_on+0x5b/0x180 [ 672.565361] do_syscall_64+0x33/0x40 [ 672.566157] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 672.567265] RIP: 0033:0x7fcf914ffb19 [ 672.568061] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 672.572024] RSP: 002b:00007fcf8ea75188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 672.573655] RAX: ffffffffffffffda RBX: 00007fcf91612f60 RCX: 00007fcf914ffb19 [ 672.575188] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 672.576710] RBP: 00007fcf8ea751d0 R08: 0000000000000000 R09: 0000000000000000 [ 672.578239] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 672.579780] R13: 00007ffd78c3ee2f R14: 00007fcf8ea75300 R15: 0000000000022000 [ 672.604533] FAULT_INJECTION: forcing a failure. [ 672.604533] name failslab, interval 1, probability 0, space 0, times 0 [ 672.607151] CPU: 0 PID: 6241 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 672.608688] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 672.610485] Call Trace: [ 672.611068] dump_stack+0x107/0x167 [ 672.611851] should_fail.cold+0x5/0xa [ 672.612669] ? ext4_alloc_inode+0x1a/0x670 [ 672.613574] should_failslab+0x5/0x20 [ 672.614390] kmem_cache_alloc+0x5b/0x310 [ 672.615270] ? lock_acquire+0x197/0x470 [ 672.616125] ? ext4_init_journal_params+0x350/0x350 [ 672.617192] ext4_alloc_inode+0x1a/0x670 [ 672.618062] ? ext4_init_journal_params+0x350/0x350 [ 672.619137] alloc_inode+0x63/0x240 [ 672.619916] new_inode+0x23/0x250 [ 672.620665] __ext4_new_inode+0x32c/0x5370 [ 672.621573] ? trace_hardirqs_on+0x5b/0x180 [ 672.622525] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 672.623558] ? do_raw_spin_lock+0x121/0x260 [ 672.624489] ? dquot_initialize_needed+0x290/0x290 [ 672.625542] ? do_raw_spin_unlock+0x4f/0x220 [ 672.626486] ? d_splice_alias+0x4d0/0xc60 [ 672.627411] ext4_create+0x2ce/0x4d0 [ 672.628227] ? ext4_mknod+0x4e0/0x4e0 [ 672.629055] ? ext4_mknod+0x4e0/0x4e0 [ 672.629874] lookup_open.isra.0+0xea8/0x1270 [ 672.630833] ? vfs_tmpfile+0x350/0x350 [ 672.631711] path_openat+0x972/0x2770 [ 672.632540] ? path_lookupat+0x860/0x860 [ 672.633414] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 672.634545] ? lock_acquire+0x197/0x470 [ 672.635397] ? find_held_lock+0x2c/0x110 [ 672.636281] do_filp_open+0x190/0x3e0 [ 672.637095] ? may_open_dev+0xf0/0xf0 [ 672.637920] ? do_raw_spin_lock+0x121/0x260 [ 672.638865] ? rwlock_bug.part.0+0x90/0x90 [ 672.639780] ? _raw_spin_unlock+0x1a/0x30 [ 672.640668] ? alloc_fd+0x2e7/0x670 [ 672.641460] do_sys_openat2+0x171/0x4d0 [ 672.642316] ? build_open_flags+0x6f0/0x6f0 [ 672.643247] ? __mutex_unlock_slowpath+0xe1/0x600 [ 672.644283] ? wait_for_completion_io+0x270/0x270 [ 672.645325] __x64_sys_openat+0x13f/0x1f0 [ 672.646214] ? __ia32_sys_open+0x1c0/0x1c0 [ 672.647125] ? ksys_write+0x1a9/0x260 [ 672.647950] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 672.649075] ? syscall_enter_from_user_mode+0x1d/0x50 [ 672.650184] do_syscall_64+0x33/0x40 [ 672.650991] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 672.652091] RIP: 0033:0x7ff27c0cdb19 [ 672.652888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 672.653894] FAULT_INJECTION: forcing a failure. [ 672.653894] name failslab, interval 1, probability 0, space 0, times 0 [ 672.656884] RSP: 002b:00007ff279643188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 672.656942] RAX: ffffffffffffffda RBX: 00007ff27c1e0f60 RCX: 00007ff27c0cdb19 [ 672.656959] RDX: 0000000000105142 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 672.663978] RBP: 00007ff2796431d0 R08: 0000000000000000 R09: 0000000000000000 [ 672.665510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 672.667053] R13: 00007ffe2ad57a7f R14: 00007ff279643300 R15: 0000000000022000 [ 672.668613] CPU: 1 PID: 6243 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 672.670097] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 672.671887] Call Trace: [ 672.672453] dump_stack+0x107/0x167 [ 672.673232] should_fail.cold+0x5/0xa [ 672.674046] ? create_object.isra.0+0x3a/0xa20 [ 672.675029] should_failslab+0x5/0x20 [ 672.675843] kmem_cache_alloc+0x5b/0x310 [ 672.676717] create_object.isra.0+0x3a/0xa20 [ 672.677654] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 672.678751] kmem_cache_alloc+0x159/0x310 [ 672.679637] ? perf_event_sched_in.isra.0+0x80/0x80 [ 672.680707] getname_flags.part.0+0x50/0x4f0 [ 672.681649] getname+0x8e/0xd0 [ 672.682337] do_sys_openat2+0xf9/0x4d0 [ 672.683176] ? __switch_to_asm+0x34/0x60 [ 672.684046] ? build_open_flags+0x6f0/0x6f0 [ 672.684982] __x64_sys_creat+0xc9/0x120 [ 672.685833] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 672.686914] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 672.688033] ? syscall_enter_from_user_mode+0x1d/0x50 [ 672.689132] ? trace_hardirqs_on+0x5b/0x180 [ 672.690055] do_syscall_64+0x33/0x40 [ 672.690862] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 672.691958] RIP: 0033:0x7fdebd7f1b19 [ 672.692752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 672.696700] RSP: 002b:00007fdebad46188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 672.698327] RAX: ffffffffffffffda RBX: 00007fdebd905020 RCX: 00007fdebd7f1b19 [ 672.699860] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 672.701386] RBP: 00007fdebad461d0 R08: 0000000000000000 R09: 0000000000000000 [ 672.702920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 672.704448] R13: 00007ffce3c54b0f R14: 00007fdebad46300 R15: 0000000000022000 [ 672.706371] loop6: detected capacity change from 0 to 262144 18:59:41 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) (fail_nth: 5) [ 672.774942] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 18:59:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x30) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 18:59:41 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) (fail_nth: 3) [ 672.808580] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=32 sclass=netlink_tcpdiag_socket pid=6246 comm=syz-executor.2 18:59:41 executing program 5: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r0 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r1 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r0}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r1}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:59:41 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) (fail_nth: 11) 18:59:41 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) [ 672.843773] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=6246 comm=syz-executor.2 [ 672.889904] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=6255 comm=syz-executor.2 18:59:41 executing program 6: syz_io_uring_setup(0x0, 0x0, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$FIOCLEX(r0, 0x5451) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000018c0)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x9, 0x81, 0x0, 0x1ff}]}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x0) ioctl$CDROMREADALL(0xffffffffffffffff, 0x5318, &(0x7f0000001a80)) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000002ac0)=ANY=[@ANYBLOB="080500988400014637b5e6a174b7b2b317b4044a94da343dd489e684a04f4ca90665864272f2fedc47a9342fef8ad1fc88337e6391545bf80b8ea61a907e1120dcdd2930f3eace765860d93659a6dc77d049d1d90bf956808d12c853d595ab7ea7e76402b517c198dc7ffbdbb38ab65f84f5242824efb291f523ece2d8e79434f9fe77da5ead57c5f16fed9a43b14e466358a6b4c3a1a8361e8199db7e4116e6031e72ada1c25a85ea221f56", @ANYRES16, @ANYBLOB="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"], 0x508}, 0x1, 0x0, 0x0, 0x40000}, 0x48804) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0), 0x1, 0x0) sendmsg$NL80211_CMD_LEAVE_MESH(r4, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f0000000240)=ANY=[@ANYBLOB=')\x00\x00 ', @ANYRES16, @ANYBLOB="280026bd704a826946", @ANYRES32=r3, @ANYRES16], 0x28}, 0x1, 0x0, 0x0, 0x408c0}, 0x8054) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x80202, 0x100) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:59:41 executing program 2: creat(&(0x7f00000004c0)='./file0\x00', 0x0) mount$9p_unix(&(0x7f0000000500)='\x00', &(0x7f0000000540)='./file0\x00', &(0x7f0000000580), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7472616e733d756e69782c00d56e3deb7139b48dec86d8de34aa6fefb8ccc776532acfcb1080f7791d522481c61d028f121dd0a52ad62db5dc94a22ae3ff64c017b6f9e1aed2e9f32d8be3dc72e2936867f3f34d17f7fbf8d3c4efffc84336b7a0cbd2"]) [ 672.938653] FAULT_INJECTION: forcing a failure. [ 672.938653] name failslab, interval 1, probability 0, space 0, times 0 [ 672.941191] CPU: 0 PID: 6258 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 672.942735] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 672.944472] Call Trace: [ 672.945027] dump_stack+0x107/0x167 [ 672.945787] should_fail.cold+0x5/0xa [ 672.946594] ? create_object.isra.0+0x3a/0xa20 [ 672.947541] should_failslab+0x5/0x20 [ 672.948341] kmem_cache_alloc+0x5b/0x310 [ 672.949199] create_object.isra.0+0x3a/0xa20 [ 672.950113] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 672.951185] kmem_cache_alloc+0x159/0x310 [ 672.952060] __alloc_file+0x21/0x320 [ 672.952840] alloc_empty_file+0x6d/0x170 [ 672.953690] path_openat+0xe6/0x2770 [ 672.954468] ? __lock_acquire+0x1657/0x5b00 [ 672.955390] ? path_lookupat+0x860/0x860 [ 672.956236] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 672.957326] ? lock_acquire+0x197/0x470 [ 672.958157] ? find_held_lock+0x2c/0x110 [ 672.959026] do_filp_open+0x190/0x3e0 [ 672.959819] ? may_open_dev+0xf0/0xf0 [ 672.960619] ? alloc_fd+0x2e7/0x670 [ 672.961377] ? lock_downgrade+0x6d0/0x6d0 [ 672.962237] ? do_raw_spin_lock+0x121/0x260 [ 672.963142] ? rwlock_bug.part.0+0x90/0x90 [ 672.964033] ? _raw_spin_unlock+0x1a/0x30 [ 672.964906] ? alloc_fd+0x2e7/0x670 [ 672.965681] do_sys_openat2+0x171/0x4d0 [ 672.966519] ? build_open_flags+0x6f0/0x6f0 [ 672.967435] ? wait_for_completion_io+0x270/0x270 [ 672.968450] ? rcu_read_lock_any_held+0x75/0xa0 [ 672.969423] ? vfs_write+0x354/0xb10 [ 672.970205] __x64_sys_creat+0xc9/0x120 [ 672.971047] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 672.972096] ? __ia32_sys_read+0xb0/0xb0 [ 672.972951] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 672.974051] ? syscall_enter_from_user_mode+0x1d/0x50 [ 672.975135] ? trace_hardirqs_on+0x5b/0x180 [ 672.976036] do_syscall_64+0x33/0x40 [ 672.976821] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 672.977900] RIP: 0033:0x7fcf914ffb19 [ 672.978695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 672.982552] RSP: 002b:00007fcf8ea75188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 672.984150] RAX: ffffffffffffffda RBX: 00007fcf91612f60 RCX: 00007fcf914ffb19 [ 672.985640] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 672.987141] RBP: 00007fcf8ea751d0 R08: 0000000000000000 R09: 0000000000000000 [ 672.988640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 672.990143] R13: 00007ffd78c3ee2f R14: 00007fcf8ea75300 R15: 0000000000022000 [ 673.071460] FAULT_INJECTION: forcing a failure. [ 673.071460] name failslab, interval 1, probability 0, space 0, times 0 [ 673.073829] CPU: 0 PID: 6263 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 673.075266] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 673.077010] Call Trace: [ 673.077568] dump_stack+0x107/0x167 [ 673.078341] should_fail.cold+0x5/0xa [ 673.079159] ? create_object.isra.0+0x3a/0xa20 [ 673.080113] should_failslab+0x5/0x20 [ 673.080915] kmem_cache_alloc+0x5b/0x310 [ 673.081783] create_object.isra.0+0x3a/0xa20 [ 673.082725] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 673.083796] kmem_cache_alloc+0x159/0x310 [ 673.084671] ? lock_acquire+0x197/0x470 18:59:41 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) (fail_nth: 6) [ 673.085510] ? ext4_init_journal_params+0x350/0x350 [ 673.086729] ext4_alloc_inode+0x1a/0x670 [ 673.087583] ? ext4_init_journal_params+0x350/0x350 [ 673.088628] alloc_inode+0x63/0x240 [ 673.089396] new_inode+0x23/0x250 [ 673.090132] __ext4_new_inode+0x32c/0x5370 [ 673.091031] ? trace_hardirqs_on+0x5b/0x180 [ 673.091957] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 673.092969] ? do_raw_spin_lock+0x121/0x260 [ 673.093881] ? dquot_initialize_needed+0x290/0x290 [ 673.094915] ? do_raw_spin_unlock+0x4f/0x220 [ 673.095840] ? d_splice_alias+0x4d0/0xc60 [ 673.096717] ext4_create+0x2ce/0x4d0 [ 673.097509] ? ext4_mknod+0x4e0/0x4e0 [ 673.098319] ? ext4_mknod+0x4e0/0x4e0 [ 673.099126] lookup_open.isra.0+0xea8/0x1270 [ 673.100058] ? vfs_tmpfile+0x350/0x350 [ 673.100911] path_openat+0x972/0x2770 [ 673.101723] ? path_lookupat+0x860/0x860 [ 673.102589] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 673.103691] ? lock_acquire+0x197/0x470 [ 673.104529] ? find_held_lock+0x2c/0x110 [ 673.105400] do_filp_open+0x190/0x3e0 [ 673.106199] ? may_open_dev+0xf0/0xf0 [ 673.107016] ? do_raw_spin_lock+0x121/0x260 [ 673.107925] ? rwlock_bug.part.0+0x90/0x90 [ 673.108830] ? _raw_spin_unlock+0x1a/0x30 [ 673.109710] ? alloc_fd+0x2e7/0x670 [ 673.110486] do_sys_openat2+0x171/0x4d0 [ 673.111340] ? build_open_flags+0x6f0/0x6f0 [ 673.112240] ? __mutex_unlock_slowpath+0xe1/0x600 [ 673.113249] ? wait_for_completion_io+0x270/0x270 [ 673.114269] __x64_sys_openat+0x13f/0x1f0 [ 673.115152] ? __ia32_sys_open+0x1c0/0x1c0 [ 673.116038] ? ksys_write+0x1a9/0x260 [ 673.116852] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 673.117951] ? syscall_enter_from_user_mode+0x1d/0x50 [ 673.119048] do_syscall_64+0x33/0x40 [ 673.119834] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 673.120907] RIP: 0033:0x7ff27c0cdb19 [ 673.121685] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 673.125526] RSP: 002b:00007ff279643188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 673.127133] RAX: ffffffffffffffda RBX: 00007ff27c1e0f60 RCX: 00007ff27c0cdb19 [ 673.128630] RDX: 0000000000105142 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 673.130138] RBP: 00007ff2796431d0 R08: 0000000000000000 R09: 0000000000000000 [ 673.131649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 673.133145] R13: 00007ffe2ad57a7f R14: 00007ff279643300 R15: 0000000000022000 [ 673.195293] FAULT_INJECTION: forcing a failure. [ 673.195293] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 673.198101] CPU: 0 PID: 6265 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 673.199579] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 673.201280] Call Trace: [ 673.201831] dump_stack+0x107/0x167 [ 673.202593] should_fail.cold+0x5/0xa [ 673.203382] strncpy_from_user+0x34/0x470 [ 673.204239] getname_flags.part.0+0x95/0x4f0 [ 673.205141] getname+0x8e/0xd0 [ 673.205801] do_sys_openat2+0xf9/0x4d0 [ 673.206606] ? build_open_flags+0x6f0/0x6f0 [ 673.207499] ? wait_for_completion_io+0x270/0x270 [ 673.208487] ? rcu_read_lock_any_held+0x75/0xa0 [ 673.209434] ? vfs_write+0x354/0xb10 [ 673.210205] __x64_sys_creat+0xc9/0x120 [ 673.211033] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 673.212066] ? __ia32_sys_read+0xb0/0xb0 [ 673.212905] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 673.213984] ? syscall_enter_from_user_mode+0x1d/0x50 [ 673.215043] ? trace_hardirqs_on+0x5b/0x180 [ 673.215936] do_syscall_64+0x33/0x40 [ 673.216698] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 673.217749] RIP: 0033:0x7fdebd7f1b19 [ 673.218512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 673.222305] RSP: 002b:00007fdebad67188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 673.223887] RAX: ffffffffffffffda RBX: 00007fdebd904f60 RCX: 00007fdebd7f1b19 [ 673.225342] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 673.226804] RBP: 00007fdebad671d0 R08: 0000000000000000 R09: 0000000000000000 [ 673.228259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 673.229713] R13: 00007ffce3c54b0f R14: 00007fdebad67300 R15: 0000000000022000 18:59:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x30) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 18:59:41 executing program 5: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r0 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r1 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r0}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r1}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:59:41 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) [ 673.421509] FAULT_INJECTION: forcing a failure. [ 673.421509] name failslab, interval 1, probability 0, space 0, times 0 [ 673.423724] CPU: 0 PID: 6277 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 673.425064] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 673.426640] Call Trace: [ 673.427151] dump_stack+0x107/0x167 [ 673.427838] should_fail.cold+0x5/0xa [ 673.428550] ? security_file_alloc+0x34/0x170 [ 673.429380] should_failslab+0x5/0x20 [ 673.430088] kmem_cache_alloc+0x5b/0x310 [ 673.430849] security_file_alloc+0x34/0x170 [ 673.431646] __alloc_file+0xb7/0x320 [ 673.432358] alloc_empty_file+0x6d/0x170 [ 673.433116] path_openat+0xe6/0x2770 [ 673.433803] ? __lock_acquire+0x1657/0x5b00 [ 673.434615] ? path_lookupat+0x860/0x860 [ 673.435377] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 673.436353] ? lock_acquire+0x197/0x470 [ 673.437087] ? find_held_lock+0x2c/0x110 [ 673.437848] do_filp_open+0x190/0x3e0 [ 673.438570] ? may_open_dev+0xf0/0xf0 [ 673.439283] ? alloc_fd+0x2e7/0x670 [ 673.439952] ? lock_downgrade+0x6d0/0x6d0 [ 673.440714] ? do_raw_spin_lock+0x121/0x260 [ 673.441516] ? rwlock_bug.part.0+0x90/0x90 [ 673.442293] ? _raw_spin_unlock+0x1a/0x30 [ 673.443072] ? alloc_fd+0x2e7/0x670 [ 673.443751] do_sys_openat2+0x171/0x4d0 [ 673.444495] ? build_open_flags+0x6f0/0x6f0 [ 673.445303] ? wait_for_completion_io+0x270/0x270 [ 673.446197] ? rcu_read_lock_any_held+0x75/0xa0 [ 673.447061] ? vfs_write+0x354/0xb10 [ 673.447747] __x64_sys_creat+0xc9/0x120 [ 673.448490] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 673.449409] ? __ia32_sys_read+0xb0/0xb0 [ 673.450164] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 673.451145] ? syscall_enter_from_user_mode+0x1d/0x50 [ 673.452098] ? trace_hardirqs_on+0x5b/0x180 [ 673.452899] do_syscall_64+0x33/0x40 [ 673.453593] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 673.454555] RIP: 0033:0x7fcf914ffb19 [ 673.455276] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 673.458711] RSP: 002b:00007fcf8ea75188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 673.460117] RAX: ffffffffffffffda RBX: 00007fcf91612f60 RCX: 00007fcf914ffb19 [ 673.461438] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 673.462772] RBP: 00007fcf8ea751d0 R08: 0000000000000000 R09: 0000000000000000 [ 673.464092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 673.465414] R13: 00007ffd78c3ee2f R14: 00007fcf8ea75300 R15: 0000000000022000 18:59:53 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) (fail_nth: 12) 18:59:53 executing program 5: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r0 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r1 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r0}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r1}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:59:53 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 18:59:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x13900}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000001500), 0x4) syz_emit_ethernet(0x2e, &(0x7f0000000280)={@multicast, @empty, @val={@void}, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0xa, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xd}, @remote, @remote, @remote}}}}, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/tty/drivers\x00', 0x0, 0x0) fsync(r1) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {0xb}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(r1, 0x9360, 0x800) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@cache_mmap}, {@version_L}]}}) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) dup2(0xffffffffffffffff, r2) socket$inet6_udplite(0xa, 0x2, 0x88) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) 18:59:53 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) (fail_nth: 4) 18:59:53 executing program 2: pread64(0xffffffffffffffff, &(0x7f0000000280)=""/212, 0xd4, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) creat(&(0x7f0000000040)='./file1\x00', 0x80) creat(&(0x7f00000001c0)='./file1\x00', 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000480)='net/nfsfs\x00') ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000380)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file1\x00'}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x10, r0, 0x50460000) write$P9_RREADLINK(r3, &(0x7f00000003c0)={0x10, 0x17, 0x1, {0x7, './file1'}}, 0x10) getsockname(r0, &(0x7f0000000200)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10}, &(0x7f00000000c0)=0x80) fallocate(r1, 0x42, 0x3, 0x7ff) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0xb) readv(r0, &(0x7f0000000400)=[{&(0x7f0000000440)=""/11, 0xb}, {&(0x7f0000000100)=""/130, 0x82}, {&(0x7f0000000780)=""/4096, 0x1000}], 0x3) preadv2(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:59:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x30) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 18:59:53 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) (fail_nth: 7) [ 685.587916] FAULT_INJECTION: forcing a failure. [ 685.587916] name failslab, interval 1, probability 0, space 0, times 0 [ 685.589546] CPU: 0 PID: 6305 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 685.589650] FAULT_INJECTION: forcing a failure. [ 685.589650] name failslab, interval 1, probability 0, space 0, times 0 [ 685.590436] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 685.590442] Call Trace: [ 685.590460] dump_stack+0x107/0x167 [ 685.590474] should_fail.cold+0x5/0xa [ 685.590488] ? security_inode_alloc+0x34/0x160 [ 685.590506] should_failslab+0x5/0x20 [ 685.596241] kmem_cache_alloc+0x5b/0x310 [ 685.596759] security_inode_alloc+0x34/0x160 [ 685.597322] inode_init_always+0xa4e/0xd10 [ 685.597857] alloc_inode+0x84/0x240 [ 685.598318] new_inode+0x23/0x250 [ 685.598767] __ext4_new_inode+0x32c/0x5370 [ 685.599301] ? __lockdep_reset_lock+0x180/0x180 [ 685.599897] ? trace_hardirqs_on+0x5b/0x180 [ 685.600451] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 685.601067] ? do_raw_spin_lock+0x121/0x260 [ 685.601620] ? dquot_initialize_needed+0x290/0x290 [ 685.602254] ? do_raw_spin_unlock+0x4f/0x220 [ 685.602824] ? d_splice_alias+0x4d0/0xc60 [ 685.603363] ext4_create+0x2ce/0x4d0 [ 685.603840] ? ext4_mknod+0x4e0/0x4e0 [ 685.604338] ? ext4_mknod+0x4e0/0x4e0 [ 685.604817] lookup_open.isra.0+0xea8/0x1270 [ 685.605379] ? vfs_tmpfile+0x350/0x350 [ 685.605894] path_openat+0x972/0x2770 [ 685.606380] ? path_lookupat+0x860/0x860 [ 685.606897] ? perf_trace_lock+0xac/0x490 [ 685.607412] ? lock_acquire+0x197/0x470 [ 685.607909] ? find_held_lock+0x2c/0x110 [ 685.608417] ? __lockdep_reset_lock+0x180/0x180 [ 685.609010] do_filp_open+0x190/0x3e0 [ 685.609487] ? may_open_dev+0xf0/0xf0 [ 685.609968] ? do_raw_spin_lock+0x121/0x260 [ 685.610512] ? rwlock_bug.part.0+0x90/0x90 [ 685.611054] ? _raw_spin_unlock+0x1a/0x30 [ 685.611571] ? alloc_fd+0x2e7/0x670 [ 685.612040] do_sys_openat2+0x171/0x4d0 [ 685.612553] ? build_open_flags+0x6f0/0x6f0 [ 685.613095] ? __mutex_unlock_slowpath+0xe1/0x600 [ 685.613703] ? wait_for_completion_io+0x270/0x270 [ 685.614313] __x64_sys_openat+0x13f/0x1f0 [ 685.614850] ? __ia32_sys_open+0x1c0/0x1c0 [ 685.615384] ? ksys_write+0x1a9/0x260 [ 685.615879] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 685.616538] ? syscall_enter_from_user_mode+0x1d/0x50 [ 685.617188] do_syscall_64+0x33/0x40 [ 685.617655] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 685.618295] RIP: 0033:0x7ff27c0cdb19 [ 685.618771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 685.621063] RSP: 002b:00007ff279643188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 685.622017] RAX: ffffffffffffffda RBX: 00007ff27c1e0f60 RCX: 00007ff27c0cdb19 [ 685.622921] RDX: 0000000000105142 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 685.623815] RBP: 00007ff2796431d0 R08: 0000000000000000 R09: 0000000000000000 [ 685.624710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 685.625614] R13: 00007ffe2ad57a7f R14: 00007ff279643300 R15: 0000000000022000 [ 685.626545] CPU: 1 PID: 6306 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 685.628069] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 685.629893] Call Trace: [ 685.630499] dump_stack+0x107/0x167 [ 685.631306] should_fail.cold+0x5/0xa [ 685.632137] ? create_object.isra.0+0x3a/0xa20 [ 685.633134] should_failslab+0x5/0x20 [ 685.633963] kmem_cache_alloc+0x5b/0x310 [ 685.634861] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 685.636069] create_object.isra.0+0x3a/0xa20 [ 685.637029] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 685.638150] kmem_cache_alloc+0x159/0x310 [ 685.639078] security_file_alloc+0x34/0x170 [ 685.640024] __alloc_file+0xb7/0x320 [ 685.640838] alloc_empty_file+0x6d/0x170 [ 685.641727] path_openat+0xe6/0x2770 [ 685.642537] ? __lock_acquire+0x1657/0x5b00 [ 685.643513] ? path_lookupat+0x860/0x860 [ 685.644409] ? perf_trace_lock+0xac/0x490 [ 685.645315] ? lock_acquire+0x197/0x470 [ 685.646182] ? find_held_lock+0x2c/0x110 [ 685.647081] ? __lockdep_reset_lock+0x180/0x180 [ 685.648109] do_filp_open+0x190/0x3e0 [ 685.648942] ? may_open_dev+0xf0/0xf0 [ 685.649776] ? alloc_fd+0x2e7/0x670 [ 685.650569] ? lock_downgrade+0x6d0/0x6d0 [ 685.651471] ? do_raw_spin_lock+0x121/0x260 [ 685.652404] ? rwlock_bug.part.0+0x90/0x90 [ 685.653333] ? _raw_spin_unlock+0x1a/0x30 [ 685.654229] ? alloc_fd+0x2e7/0x670 [ 685.655043] do_sys_openat2+0x171/0x4d0 [ 685.655911] ? build_open_flags+0x6f0/0x6f0 [ 685.656844] ? wait_for_completion_io+0x270/0x270 [ 685.657890] ? rcu_read_lock_any_held+0x75/0xa0 [ 685.658905] ? vfs_write+0x354/0xb10 [ 685.659719] __x64_sys_creat+0xc9/0x120 [ 685.660583] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 685.661659] ? __ia32_sys_read+0xb0/0xb0 [ 685.662544] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 685.663695] ? syscall_enter_from_user_mode+0x1d/0x50 [ 685.664804] ? trace_hardirqs_on+0x5b/0x180 [ 685.665742] do_syscall_64+0x33/0x40 [ 685.666547] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 685.667679] RIP: 0033:0x7fcf914ffb19 [ 685.668485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 685.672453] RSP: 002b:00007fcf8ea75188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 685.674087] RAX: ffffffffffffffda RBX: 00007fcf91612f60 RCX: 00007fcf914ffb19 [ 685.675627] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 685.677153] RBP: 00007fcf8ea751d0 R08: 0000000000000000 R09: 0000000000000000 [ 685.678689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 685.680218] R13: 00007ffd78c3ee2f R14: 00007fcf8ea75300 R15: 0000000000022000 [ 685.684814] FAULT_INJECTION: forcing a failure. [ 685.684814] name failslab, interval 1, probability 0, space 0, times 0 [ 685.687284] CPU: 1 PID: 6310 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 685.688755] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 685.690521] Call Trace: [ 685.691105] dump_stack+0x107/0x167 [ 685.691886] should_fail.cold+0x5/0xa [ 685.692701] ? __alloc_file+0x21/0x320 [ 685.693533] should_failslab+0x5/0x20 [ 685.694347] kmem_cache_alloc+0x5b/0x310 [ 685.695231] __alloc_file+0x21/0x320 [ 685.696025] alloc_empty_file+0x6d/0x170 [ 685.696891] path_openat+0xe6/0x2770 [ 685.697688] ? __lock_acquire+0x1657/0x5b00 [ 685.698620] ? path_lookupat+0x860/0x860 [ 685.699505] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 685.700626] ? lock_acquire+0x197/0x470 [ 685.701470] ? find_held_lock+0x2c/0x110 [ 685.702348] do_filp_open+0x190/0x3e0 [ 685.703169] ? may_open_dev+0xf0/0xf0 [ 685.703988] ? alloc_fd+0x2e7/0x670 [ 685.704763] ? lock_downgrade+0x6d0/0x6d0 [ 685.705643] ? do_raw_spin_lock+0x121/0x260 [ 685.706557] ? rwlock_bug.part.0+0x90/0x90 [ 685.707465] ? _raw_spin_unlock+0x1a/0x30 [ 685.708342] ? alloc_fd+0x2e7/0x670 [ 685.709119] do_sys_openat2+0x171/0x4d0 [ 685.709960] ? build_open_flags+0x6f0/0x6f0 [ 685.710890] ? wait_for_completion_io+0x270/0x270 [ 685.711907] ? rcu_read_lock_any_held+0x75/0xa0 [ 685.712893] ? vfs_write+0x354/0xb10 [ 685.713688] __x64_sys_creat+0xc9/0x120 [ 685.714526] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 685.715597] ? __ia32_sys_read+0xb0/0xb0 [ 685.716459] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 685.717568] ? syscall_enter_from_user_mode+0x1d/0x50 [ 685.718657] ? trace_hardirqs_on+0x5b/0x180 [ 685.719577] do_syscall_64+0x33/0x40 [ 685.720368] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 685.721449] RIP: 0033:0x7fdebd7f1b19 [ 685.722235] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 685.726148] RSP: 002b:00007fdebad46188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 685.727761] RAX: ffffffffffffffda RBX: 00007fdebd905020 RCX: 00007fdebd7f1b19 [ 685.729266] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 685.730769] RBP: 00007fdebad461d0 R08: 0000000000000000 R09: 0000000000000000 [ 685.732265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 685.733764] R13: 00007ffce3c54b0f R14: 00007fdebad46300 R15: 0000000000022000 [ 685.737172] kauditd_printk_skb: 38 callbacks suppressed [ 685.737189] audit: type=1326 audit(1753642794.043:102): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6296 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9b744eab19 code=0x7ffc0000 [ 685.746798] audit: type=1326 audit(1753642794.043:103): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6296 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9b744eab19 code=0x7ffc0000 [ 685.767886] audit: type=1326 audit(1753642794.046:104): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6296 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7f9b744eab19 code=0x7ffc0000 [ 685.774889] audit: type=1326 audit(1753642794.070:105): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6296 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9b744eab19 code=0x7ffc0000 [ 685.782907] audit: type=1326 audit(1753642794.070:106): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6296 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f9b7449da04 code=0x7ffc0000 [ 685.789718] audit: type=1326 audit(1753642794.071:107): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6296 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f9b7449da04 code=0x7ffc0000 [ 685.796491] audit: type=1326 audit(1753642794.071:108): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6296 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9b744eab19 code=0x7ffc0000 [ 685.802749] audit: type=1326 audit(1753642794.072:109): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6296 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f9b744eab19 code=0x7ffc0000 18:59:54 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) [ 685.811559] audit: type=1326 audit(1753642794.072:110): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6296 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9b744eab19 code=0x7ffc0000 18:59:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x30) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 18:59:54 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) (fail_nth: 13) [ 685.819305] audit: type=1326 audit(1753642794.072:111): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6296 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f9b744eab19 code=0x7ffc0000 18:59:54 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) (fail_nth: 8) 18:59:54 executing program 5: r0 = syz_io_uring_setup(0x0, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:59:54 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) (fail_nth: 5) 18:59:54 executing program 2: ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x101000, 0x0) statx(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x402}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) io_setup(0x3, &(0x7f0000000000)=0x0) r3 = inotify_init1(0x0) io_cancel(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6, 0x427, r3, &(0x7f0000000080)="9b092f6d4da7d173fbc970301e3efff493a04ced5782a5cd6755bbcc95af47e62284", 0x22, 0x100000000}, &(0x7f0000000180)) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x3000000}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x401, @mcast2, 0x8000}, 0x1c) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000240)={'sit0\x00', 0x0, 0x2f, 0x2, 0x6a, 0x101, 0x10, @private1, @private2, 0x20, 0x0, 0x61, 0x6}}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) r5 = socket$nl_generic(0x10, 0x3, 0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 18:59:54 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x28}}, 0x0) ioctl$BTRFS_IOC_FS_INFO(r0, 0x8400941f, 0x0) r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x1f8, &(0x7f0000000240), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000ff4000/0x1000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) syz_80211_join_ibss(&(0x7f0000000180)='wlan0\x00', &(0x7f00000001c0)=@default_ap_ssid, 0x6, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(r4, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r3, &(0x7f0000000100)=@IORING_OP_FSYNC={0x3, 0x5, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x8001) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r6, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r6, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r6, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000680)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x3, 0x0, 0xfff, 0x1, &(0x7f0000000640)='l$/', 0x9, 0x0, 0x0, {0x1}}, 0x9) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 685.942905] FAULT_INJECTION: forcing a failure. [ 685.942905] name failslab, interval 1, probability 0, space 0, times 0 [ 685.944324] CPU: 0 PID: 6324 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 685.945103] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 685.946202] Call Trace: [ 685.946509] dump_stack+0x107/0x167 [ 685.946941] should_fail.cold+0x5/0xa [ 685.947377] ? create_object.isra.0+0x3a/0xa20 [ 685.947900] should_failslab+0x5/0x20 [ 685.948334] kmem_cache_alloc+0x5b/0x310 [ 685.948801] create_object.isra.0+0x3a/0xa20 [ 685.949302] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 685.949880] kmem_cache_alloc+0x159/0x310 [ 685.950358] security_inode_alloc+0x34/0x160 [ 685.950868] inode_init_always+0xa4e/0xd10 [ 685.951349] alloc_inode+0x84/0x240 [ 685.951764] new_inode+0x23/0x250 [ 685.952163] __ext4_new_inode+0x32c/0x5370 [ 685.952644] ? __lockdep_reset_lock+0x180/0x180 [ 685.953179] ? trace_hardirqs_on+0x5b/0x180 [ 685.953682] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 685.954230] ? do_raw_spin_lock+0x121/0x260 [ 685.954733] ? dquot_initialize_needed+0x290/0x290 [ 685.955298] ? do_raw_spin_unlock+0x4f/0x220 [ 685.955798] ? d_splice_alias+0x4d0/0xc60 [ 685.956276] ext4_create+0x2ce/0x4d0 [ 685.956708] ? ext4_mknod+0x4e0/0x4e0 [ 685.957154] ? ext4_mknod+0x4e0/0x4e0 [ 685.957595] lookup_open.isra.0+0xea8/0x1270 [ 685.958104] ? vfs_tmpfile+0x350/0x350 [ 685.958569] path_openat+0x972/0x2770 [ 685.959021] ? path_lookupat+0x860/0x860 [ 685.959487] ? perf_trace_lock+0xac/0x490 [ 685.959961] ? lock_acquire+0x197/0x470 [ 685.960414] ? find_held_lock+0x2c/0x110 [ 685.960880] ? __lockdep_reset_lock+0x180/0x180 [ 685.961414] do_filp_open+0x190/0x3e0 [ 685.961846] ? may_open_dev+0xf0/0xf0 [ 685.962285] ? do_raw_spin_lock+0x121/0x260 [ 685.962791] ? rwlock_bug.part.0+0x90/0x90 [ 685.963281] ? _raw_spin_unlock+0x1a/0x30 [ 685.963751] ? alloc_fd+0x2e7/0x670 [ 685.964173] do_sys_openat2+0x171/0x4d0 [ 685.964630] ? build_open_flags+0x6f0/0x6f0 [ 685.965124] ? __mutex_unlock_slowpath+0xe1/0x600 [ 685.965674] ? wait_for_completion_io+0x270/0x270 [ 685.966228] __x64_sys_openat+0x13f/0x1f0 [ 685.966705] ? __ia32_sys_open+0x1c0/0x1c0 [ 685.967186] ? ksys_write+0x1a9/0x260 [ 685.967624] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 685.968221] ? syscall_enter_from_user_mode+0x1d/0x50 [ 685.968805] do_syscall_64+0x33/0x40 [ 685.969233] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 685.969814] RIP: 0033:0x7ff27c0cdb19 [ 685.970235] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 685.972328] RSP: 002b:00007ff279643188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 685.973191] RAX: ffffffffffffffda RBX: 00007ff27c1e0f60 RCX: 00007ff27c0cdb19 [ 685.974007] RDX: 0000000000105142 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 685.974821] RBP: 00007ff2796431d0 R08: 0000000000000000 R09: 0000000000000000 [ 685.975626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 685.976431] R13: 00007ffe2ad57a7f R14: 00007ff279643300 R15: 0000000000022000 [ 686.028411] FAULT_INJECTION: forcing a failure. [ 686.028411] name failslab, interval 1, probability 0, space 0, times 0 [ 686.029752] CPU: 0 PID: 6328 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 686.030534] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 686.031497] Call Trace: [ 686.031805] dump_stack+0x107/0x167 [ 686.032226] should_fail.cold+0x5/0xa [ 686.032667] ? __d_alloc+0x2a/0x990 [ 686.033085] should_failslab+0x5/0x20 [ 686.033520] kmem_cache_alloc+0x5b/0x310 [ 686.033989] __d_alloc+0x2a/0x990 [ 686.034389] d_alloc_parallel+0x111/0x1bc0 [ 686.034883] ? __d_lookup+0x396/0x760 [ 686.035321] ? lock_downgrade+0x6d0/0x6d0 [ 686.035798] ? find_held_lock+0x2c/0x110 [ 686.036266] ? __d_lookup_rcu+0x6d0/0x6d0 [ 686.036742] ? __d_lookup+0x3bf/0x760 [ 686.037178] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 686.037780] lookup_open.isra.0+0x962/0x1270 [ 686.038295] ? vfs_tmpfile+0x350/0x350 [ 686.038770] path_openat+0x972/0x2770 [ 686.039213] ? path_lookupat+0x860/0x860 [ 686.039685] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 686.040286] ? lock_acquire+0x197/0x470 [ 686.040743] ? find_held_lock+0x2c/0x110 [ 686.041218] do_filp_open+0x190/0x3e0 [ 686.041653] ? may_open_dev+0xf0/0xf0 [ 686.042089] ? do_raw_spin_lock+0x121/0x260 [ 686.042579] ? rwlock_bug.part.0+0x90/0x90 [ 686.043076] ? _raw_spin_unlock+0x1a/0x30 [ 686.043545] ? alloc_fd+0x2e7/0x670 [ 686.043967] do_sys_openat2+0x171/0x4d0 [ 686.044422] ? build_open_flags+0x6f0/0x6f0 [ 686.044913] ? wait_for_completion_io+0x270/0x270 [ 686.045471] ? rcu_read_lock_any_held+0x75/0xa0 [ 686.046004] ? vfs_write+0x354/0xb10 [ 686.046435] __x64_sys_creat+0xc9/0x120 [ 686.046898] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 686.047466] ? __ia32_sys_read+0xb0/0xb0 [ 686.047935] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 686.048533] ? syscall_enter_from_user_mode+0x1d/0x50 [ 686.049123] ? trace_hardirqs_on+0x5b/0x180 [ 686.049617] do_syscall_64+0x33/0x40 [ 686.050045] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 686.050633] RIP: 0033:0x7fcf914ffb19 [ 686.051067] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 686.053177] RSP: 002b:00007fcf8ea75188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 686.054045] RAX: ffffffffffffffda RBX: 00007fcf91612f60 RCX: 00007fcf914ffb19 [ 686.054864] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 686.055678] RBP: 00007fcf8ea751d0 R08: 0000000000000000 R09: 0000000000000000 [ 686.056492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 686.057308] R13: 00007ffd78c3ee2f R14: 00007fcf8ea75300 R15: 0000000000022000 [ 686.083945] FAULT_INJECTION: forcing a failure. [ 686.083945] name failslab, interval 1, probability 0, space 0, times 0 [ 686.085771] CPU: 0 PID: 6331 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 686.086547] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 686.087499] Call Trace: [ 686.087809] dump_stack+0x107/0x167 [ 686.088223] should_fail.cold+0x5/0xa [ 686.088657] ? create_object.isra.0+0x3a/0xa20 [ 686.089176] should_failslab+0x5/0x20 [ 686.089609] kmem_cache_alloc+0x5b/0x310 [ 686.090073] create_object.isra.0+0x3a/0xa20 [ 686.090573] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 686.091172] kmem_cache_alloc+0x159/0x310 [ 686.091647] __alloc_file+0x21/0x320 [ 686.092070] alloc_empty_file+0x6d/0x170 [ 686.092532] path_openat+0xe6/0x2770 [ 686.092959] ? __lock_acquire+0x1657/0x5b00 [ 686.093454] ? path_lookupat+0x860/0x860 [ 686.093919] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 686.094517] ? lock_acquire+0x197/0x470 [ 686.094979] ? find_held_lock+0x2c/0x110 [ 686.095443] do_filp_open+0x190/0x3e0 [ 686.095876] ? may_open_dev+0xf0/0xf0 [ 686.096313] ? alloc_fd+0x2e7/0x670 [ 686.096730] ? lock_downgrade+0x6d0/0x6d0 [ 686.097199] ? do_raw_spin_lock+0x121/0x260 [ 686.097693] ? rwlock_bug.part.0+0x90/0x90 [ 686.098180] ? _raw_spin_unlock+0x1a/0x30 [ 686.098649] ? alloc_fd+0x2e7/0x670 [ 686.099077] do_sys_openat2+0x171/0x4d0 [ 686.099529] ? build_open_flags+0x6f0/0x6f0 [ 686.100016] ? wait_for_completion_io+0x270/0x270 [ 686.100563] ? rcu_read_lock_any_held+0x75/0xa0 [ 686.101089] ? vfs_write+0x354/0xb10 [ 686.101516] __x64_sys_creat+0xc9/0x120 [ 686.101970] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 686.102534] ? __ia32_sys_read+0xb0/0xb0 [ 686.103006] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 686.103598] ? syscall_enter_from_user_mode+0x1d/0x50 [ 686.104189] ? trace_hardirqs_on+0x5b/0x180 [ 686.104683] do_syscall_64+0x33/0x40 [ 686.105104] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 686.105690] RIP: 0033:0x7fdebd7f1b19 [ 686.106112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 686.108207] RSP: 002b:00007fdebad67188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 686.109064] RAX: ffffffffffffffda RBX: 00007fdebd904f60 RCX: 00007fdebd7f1b19 [ 686.109870] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 686.110690] RBP: 00007fdebad671d0 R08: 0000000000000000 R09: 0000000000000000 [ 686.111498] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 686.112305] R13: 00007ffce3c54b0f R14: 00007fdebad67300 R15: 0000000000022000 [ 686.144602] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 686.145593] print_req_error: 1794 callbacks suppressed [ 686.145604] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 686.147376] buffer_io_error: 2062 callbacks suppressed [ 686.147382] Buffer I/O error on dev sr0, logical block 0, async page read [ 686.149313] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 686.150076] blk_update_request: I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 686.151429] Buffer I/O error on dev sr0, logical block 1, async page read [ 686.152814] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 686.153531] blk_update_request: I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 686.154682] Buffer I/O error on dev sr0, logical block 2, async page read [ 686.155796] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 686.156438] blk_update_request: I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 686.157627] Buffer I/O error on dev sr0, logical block 3, async page read [ 686.158969] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 686.159736] blk_update_request: I/O error, dev sr0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 686.160879] Buffer I/O error on dev sr0, logical block 4, async page read [ 686.162269] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 686.162937] blk_update_request: I/O error, dev sr0, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 686.164118] Buffer I/O error on dev sr0, logical block 5, async page read [ 686.165231] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 686.165842] blk_update_request: I/O error, dev sr0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 686.167007] Buffer I/O error on dev sr0, logical block 6, async page read [ 686.168353] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 686.169164] blk_update_request: I/O error, dev sr0, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 686.170298] Buffer I/O error on dev sr0, logical block 7, async page read [ 686.220679] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 686.221503] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 686.222653] Buffer I/O error on dev sr0, logical block 0, async page read [ 686.224478] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 686.225393] blk_update_request: I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 686.226516] Buffer I/O error on dev sr0, logical block 1, async page read [ 686.229350] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 686.236144] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 686.237971] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 686.239886] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 686.241489] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 686.244951] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 19:00:14 executing program 5: r0 = syz_io_uring_setup(0x0, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:00:14 executing program 2: ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x101000, 0x0) statx(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x402}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) io_setup(0x3, &(0x7f0000000000)=0x0) r3 = inotify_init1(0x0) io_cancel(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6, 0x427, r3, &(0x7f0000000080)="9b092f6d4da7d173fbc970301e3efff493a04ced5782a5cd6755bbcc95af47e62284", 0x22, 0x100000000}, &(0x7f0000000180)) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x3000000}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x401, @mcast2, 0x8000}, 0x1c) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000240)={'sit0\x00', 0x0, 0x2f, 0x2, 0x6a, 0x101, 0x10, @private1, @private2, 0x20, 0x0, 0x61, 0x6}}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) r5 = socket$nl_generic(0x10, 0x3, 0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 19:00:14 executing program 6: rt_sigreturn() perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000000380)=ANY=[], 0x30}}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000001580)=@IORING_OP_RECVMSG={0xa, 0x3, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x200000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)=@nl=@unspec={0x0, 0xff00, 0x0, 0xf5ffffff}, 0x80) io_uring_enter(r0, 0x3491, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x7e5c, &(0x7f0000000240)={0x0, 0xb22, 0x0, 0x1, 0x3b5, 0x0, r0}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000300)) syz_io_uring_submit(r5, 0x0, &(0x7f0000000380)=@IORING_OP_LINK_TIMEOUT={0xf, 0x5, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x989680}, 0x1, 0x48f7e3ddb9b7e1c7}, 0x6) 19:00:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x30) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 19:00:14 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) (fail_nth: 9) 19:00:14 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) (fail_nth: 6) 19:00:14 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) (fail_nth: 14) 19:00:14 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) [ 706.580363] FAULT_INJECTION: forcing a failure. [ 706.580363] name failslab, interval 1, probability 0, space 0, times 0 [ 706.582930] CPU: 1 PID: 6352 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 706.584676] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 706.586587] Call Trace: [ 706.587156] dump_stack+0x107/0x167 [ 706.587924] should_fail.cold+0x5/0xa [ 706.588721] ? jbd2__journal_start+0x190/0x7e0 [ 706.589674] should_failslab+0x5/0x20 [ 706.590501] kmem_cache_alloc+0x5b/0x310 [ 706.591463] jbd2__journal_start+0x190/0x7e0 [ 706.592664] __ext4_journal_start_sb+0x214/0x390 [ 706.593700] __ext4_new_inode+0x2e0b/0x5370 [ 706.594629] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 706.595782] ? do_raw_spin_lock+0x121/0x260 [ 706.596968] ? dquot_initialize_needed+0x290/0x290 [ 706.597995] ? do_raw_spin_unlock+0x4f/0x220 [ 706.598932] ? d_splice_alias+0x4d0/0xc60 [ 706.599819] ext4_create+0x2ce/0x4d0 [ 706.600612] ? ext4_mknod+0x4e0/0x4e0 [ 706.601422] ? ext4_mknod+0x4e0/0x4e0 [ 706.602227] lookup_open.isra.0+0xea8/0x1270 [ 706.603164] ? vfs_tmpfile+0x350/0x350 [ 706.604022] path_openat+0x972/0x2770 [ 706.604841] ? path_lookupat+0x860/0x860 [ 706.605702] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 706.606796] ? lock_acquire+0x197/0x470 [ 706.607644] ? find_held_lock+0x2c/0x110 [ 706.608511] do_filp_open+0x190/0x3e0 [ 706.609313] ? may_open_dev+0xf0/0xf0 [ 706.610129] ? do_raw_spin_lock+0x121/0x260 [ 706.611046] ? rwlock_bug.part.0+0x90/0x90 [ 706.611946] ? _raw_spin_unlock+0x1a/0x30 [ 706.612819] ? alloc_fd+0x2e7/0x670 [ 706.613778] do_sys_openat2+0x171/0x4d0 [ 706.614738] ? build_open_flags+0x6f0/0x6f0 [ 706.615809] ? __mutex_unlock_slowpath+0xe1/0x600 [ 706.616611] FAULT_INJECTION: forcing a failure. [ 706.616611] name failslab, interval 1, probability 0, space 0, times 0 [ 706.616832] ? wait_for_completion_io+0x270/0x270 [ 706.620280] __x64_sys_openat+0x13f/0x1f0 [ 706.621155] ? __ia32_sys_open+0x1c0/0x1c0 [ 706.622042] ? ksys_write+0x1a9/0x260 [ 706.622857] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 706.623975] ? syscall_enter_from_user_mode+0x1d/0x50 [ 706.625068] do_syscall_64+0x33/0x40 [ 706.625855] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 706.626943] RIP: 0033:0x7ff27c0cdb19 [ 706.627727] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 706.631561] RSP: 002b:00007ff279643188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 706.633147] RAX: ffffffffffffffda RBX: 00007ff27c1e0f60 RCX: 00007ff27c0cdb19 [ 706.634622] RDX: 0000000000105142 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 706.636132] RBP: 00007ff2796431d0 R08: 0000000000000000 R09: 0000000000000000 [ 706.637626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 706.639134] R13: 00007ffe2ad57a7f R14: 00007ff279643300 R15: 0000000000022000 [ 706.640661] CPU: 0 PID: 6354 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 706.640810] EXT4-fs error (device sda) in __ext4_new_inode:1086: Out of memory [ 706.642242] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 706.642249] Call Trace: [ 706.642281] dump_stack+0x107/0x167 [ 706.646792] FAULT_INJECTION: forcing a failure. [ 706.646792] name failslab, interval 1, probability 0, space 0, times 0 [ 706.647108] should_fail.cold+0x5/0xa [ 706.647144] ? security_file_alloc+0x34/0x170 [ 706.651354] should_failslab+0x5/0x20 [ 706.652259] kmem_cache_alloc+0x5b/0x310 [ 706.653213] security_file_alloc+0x34/0x170 [ 706.654190] __alloc_file+0xb7/0x320 [ 706.655014] alloc_empty_file+0x6d/0x170 [ 706.655897] path_openat+0xe6/0x2770 [ 706.656704] ? __lock_acquire+0x1657/0x5b00 [ 706.657631] ? path_lookupat+0x860/0x860 [ 706.658494] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 706.659613] ? lock_acquire+0x197/0x470 [ 706.660457] ? find_held_lock+0x2c/0x110 [ 706.661327] do_filp_open+0x190/0x3e0 [ 706.662134] ? may_open_dev+0xf0/0xf0 [ 706.662954] ? alloc_fd+0x2e7/0x670 [ 706.663728] ? lock_downgrade+0x6d0/0x6d0 [ 706.664613] ? do_raw_spin_lock+0x121/0x260 [ 706.665528] ? rwlock_bug.part.0+0x90/0x90 [ 706.666434] ? _raw_spin_unlock+0x1a/0x30 [ 706.667327] ? alloc_fd+0x2e7/0x670 [ 706.668115] do_sys_openat2+0x171/0x4d0 [ 706.668963] ? build_open_flags+0x6f0/0x6f0 [ 706.669916] ? wait_for_completion_io+0x270/0x270 [ 706.670942] ? rcu_read_lock_any_held+0x75/0xa0 [ 706.671933] ? vfs_write+0x354/0xb10 [ 706.672732] __x64_sys_creat+0xc9/0x120 [ 706.673564] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 706.674608] ? __ia32_sys_read+0xb0/0xb0 [ 706.675477] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 706.676575] ? syscall_enter_from_user_mode+0x1d/0x50 [ 706.677656] ? trace_hardirqs_on+0x5b/0x180 [ 706.678561] do_syscall_64+0x33/0x40 [ 706.679350] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 706.680423] RIP: 0033:0x7fdebd7f1b19 [ 706.681205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 706.685366] RSP: 002b:00007fdebad67188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 706.687708] RAX: ffffffffffffffda RBX: 00007fdebd904f60 RCX: 00007fdebd7f1b19 [ 706.689953] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 706.692075] RBP: 00007fdebad671d0 R08: 0000000000000000 R09: 0000000000000000 [ 706.693965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 706.695896] R13: 00007ffce3c54b0f R14: 00007fdebad67300 R15: 0000000000022000 [ 706.697704] CPU: 1 PID: 6356 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 706.699177] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 706.700920] Call Trace: [ 706.701483] dump_stack+0x107/0x167 [ 706.702248] should_fail.cold+0x5/0xa [ 706.703067] ? create_object.isra.0+0x3a/0xa20 [ 706.704026] should_failslab+0x5/0x20 [ 706.704825] kmem_cache_alloc+0x5b/0x310 [ 706.705684] create_object.isra.0+0x3a/0xa20 [ 706.706606] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 706.707678] kmem_cache_alloc+0x159/0x310 [ 706.708557] __d_alloc+0x2a/0x990 [ 706.709286] d_alloc_parallel+0x111/0x1bc0 [ 706.710171] ? __d_lookup+0x396/0x760 [ 706.711086] ? lock_downgrade+0x6d0/0x6d0 [ 706.711952] ? find_held_lock+0x2c/0x110 [ 706.712802] ? __d_lookup_rcu+0x6d0/0x6d0 [ 706.713667] ? __d_lookup+0x3bf/0x760 [ 706.714462] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 706.715599] lookup_open.isra.0+0x962/0x1270 [ 706.716527] ? vfs_tmpfile+0x350/0x350 [ 706.717380] path_openat+0x972/0x2770 [ 706.718201] ? path_lookupat+0x860/0x860 [ 706.719063] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 706.720165] ? lock_acquire+0x197/0x470 [ 706.720998] ? find_held_lock+0x2c/0x110 [ 706.721864] do_filp_open+0x190/0x3e0 [ 706.722669] ? may_open_dev+0xf0/0xf0 [ 706.723489] ? do_raw_spin_lock+0x121/0x260 [ 706.724394] ? rwlock_bug.part.0+0x90/0x90 [ 706.725289] ? _raw_spin_unlock+0x1a/0x30 [ 706.726161] ? alloc_fd+0x2e7/0x670 [ 706.726955] do_sys_openat2+0x171/0x4d0 [ 706.728176] ? build_open_flags+0x6f0/0x6f0 [ 706.729280] ? wait_for_completion_io+0x270/0x270 [ 706.730503] ? rcu_read_lock_any_held+0x75/0xa0 [ 706.731709] ? vfs_write+0x354/0xb10 [ 706.732570] __x64_sys_creat+0xc9/0x120 [ 706.733441] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 706.734558] ? __ia32_sys_read+0xb0/0xb0 [ 706.735479] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 706.736676] ? syscall_enter_from_user_mode+0x1d/0x50 [ 706.737825] ? trace_hardirqs_on+0x5b/0x180 [ 706.738776] do_syscall_64+0x33/0x40 [ 706.739626] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 706.740767] RIP: 0033:0x7fcf914ffb19 [ 706.741585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 706.745686] RSP: 002b:00007fcf8ea75188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 706.747384] RAX: ffffffffffffffda RBX: 00007fcf91612f60 RCX: 00007fcf914ffb19 [ 706.748960] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 706.750529] RBP: 00007fcf8ea751d0 R08: 0000000000000000 R09: 0000000000000000 [ 706.752092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 706.753654] R13: 00007ffd78c3ee2f R14: 00007fcf8ea75300 R15: 0000000000022000 [ 706.804053] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 706.805551] print_req_error: 6 callbacks suppressed [ 706.805572] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 706.809782] buffer_io_error: 6 callbacks suppressed [ 706.809796] Buffer I/O error on dev sr0, logical block 0, async page read [ 706.813587] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 706.814939] blk_update_request: I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 706.817225] Buffer I/O error on dev sr0, logical block 1, async page read [ 706.819458] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 19:00:15 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$sock_timeval(r1, 0x1, 0x43, &(0x7f0000000040)={0x0, 0xea60}, 0x10) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f00000000c0)=0x6, 0x4) perf_event_open$cgroup(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x7, 0x7, 0x4, 0x0, 0x8, 0x8, 0xc, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f0000000180), 0x2}, 0x8000, 0x4, 0x4786c2f7, 0x1, 0xffffffff, 0x23, 0x773, 0x0, 0x0, 0x0, 0x7e}, 0xffffffffffffffff, 0x4, r0, 0x8) dup3(r1, r0, 0x0) sendmsg$inet6(r1, &(0x7f00000006c0)={0x0, 0x31, &(0x7f0000000540)=[{&(0x7f0000000100)=':\x00', 0xfffffdef}], 0x1}, 0x10044001) syz_open_procfs(0x0, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) fadvise64(r2, 0x9, 0x100000000, 0x2) getpgid(0xffffffffffffffff) r3 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0x8, 0x4, @tid=r3}, &(0x7f0000000000)) [ 706.820825] blk_update_request: I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 706.823544] Buffer I/O error on dev sr0, logical block 2, async page read [ 706.827453] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 706.829116] blk_update_request: I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 706.831577] Buffer I/O error on dev sr0, logical block 3, async page read [ 706.833970] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 706.835284] blk_update_request: I/O error, dev sr0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 706.837504] Buffer I/O error on dev sr0, logical block 4, async page read [ 706.841459] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 706.842732] blk_update_request: I/O error, dev sr0, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 706.844969] Buffer I/O error on dev sr0, logical block 5, async page read [ 706.846939] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 706.848232] blk_update_request: I/O error, dev sr0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 706.850626] Buffer I/O error on dev sr0, logical block 6, async page read [ 706.852815] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 706.854148] blk_update_request: I/O error, dev sr0, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 706.856501] Buffer I/O error on dev sr0, logical block 7, async page read 19:00:15 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) (fail_nth: 15) 19:00:15 executing program 5: r0 = syz_io_uring_setup(0x0, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:00:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 19:00:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) (fail_nth: 7) 19:00:15 executing program 2: ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x101000, 0x0) statx(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x402}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) io_setup(0x3, &(0x7f0000000000)=0x0) r3 = inotify_init1(0x0) io_cancel(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6, 0x427, r3, &(0x7f0000000080)="9b092f6d4da7d173fbc970301e3efff493a04ced5782a5cd6755bbcc95af47e62284", 0x22, 0x100000000}, &(0x7f0000000180)) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) io_submit(r2, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x3000000}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x401, @mcast2, 0x8000}, 0x1c) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000240)={'sit0\x00', 0x0, 0x2f, 0x2, 0x6a, 0x101, 0x10, @private1, @private2, 0x20, 0x0, 0x61, 0x6}}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) r5 = socket$nl_generic(0x10, 0x3, 0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 19:00:15 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) (fail_nth: 10) 19:00:15 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000200), 0x24, 0x0) [ 707.099976] FAULT_INJECTION: forcing a failure. [ 707.099976] name failslab, interval 1, probability 0, space 0, times 0 [ 707.102788] CPU: 0 PID: 6375 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 707.104512] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 707.106308] Call Trace: [ 707.106913] dump_stack+0x107/0x167 [ 707.107722] should_fail.cold+0x5/0xa [ 707.108550] ? create_object.isra.0+0x3a/0xa20 [ 707.109539] should_failslab+0x5/0x20 [ 707.110360] kmem_cache_alloc+0x5b/0x310 [ 707.111247] create_object.isra.0+0x3a/0xa20 [ 707.112202] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 707.113297] kmem_cache_alloc+0x159/0x310 [ 707.114200] jbd2__journal_start+0x190/0x7e0 [ 707.115157] __ext4_journal_start_sb+0x214/0x390 [ 707.116191] __ext4_new_inode+0x2e0b/0x5370 [ 707.117142] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 707.118176] ? do_raw_spin_lock+0x121/0x260 [ 707.119115] ? dquot_initialize_needed+0x290/0x290 [ 707.120161] ? do_raw_spin_unlock+0x4f/0x220 [ 707.121100] ? d_splice_alias+0x4d0/0xc60 [ 707.121998] ext4_create+0x2ce/0x4d0 [ 707.122799] ? ext4_mknod+0x4e0/0x4e0 [ 707.123631] ? ext4_mknod+0x4e0/0x4e0 [ 707.124443] lookup_open.isra.0+0xea8/0x1270 [ 707.125395] ? vfs_tmpfile+0x350/0x350 [ 707.126261] path_openat+0x972/0x2770 [ 707.127089] ? path_lookupat+0x860/0x860 [ 707.127956] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 707.129064] ? lock_acquire+0x197/0x470 [ 707.129908] ? find_held_lock+0x2c/0x110 [ 707.130782] do_filp_open+0x190/0x3e0 [ 707.131595] ? may_open_dev+0xf0/0xf0 [ 707.132411] ? do_raw_spin_lock+0x121/0x260 [ 707.133322] ? rwlock_bug.part.0+0x90/0x90 [ 707.134222] ? _raw_spin_unlock+0x1a/0x30 [ 707.135105] ? alloc_fd+0x2e7/0x670 [ 707.135882] do_sys_openat2+0x171/0x4d0 [ 707.136722] ? build_open_flags+0x6f0/0x6f0 [ 707.137624] ? __mutex_unlock_slowpath+0xe1/0x600 [ 707.138639] ? wait_for_completion_io+0x270/0x270 [ 707.139671] __x64_sys_openat+0x13f/0x1f0 [ 707.140545] ? __ia32_sys_open+0x1c0/0x1c0 [ 707.141434] ? ksys_write+0x1a9/0x260 [ 707.142243] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 707.143360] ? syscall_enter_from_user_mode+0x1d/0x50 [ 707.144441] do_syscall_64+0x33/0x40 [ 707.145218] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 707.146286] RIP: 0033:0x7ff27c0cdb19 [ 707.147071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 707.150902] RSP: 002b:00007ff279643188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 707.152496] RAX: ffffffffffffffda RBX: 00007ff27c1e0f60 RCX: 00007ff27c0cdb19 [ 707.153984] RDX: 0000000000105142 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 707.155477] RBP: 00007ff2796431d0 R08: 0000000000000000 R09: 0000000000000000 [ 707.156957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 707.158438] R13: 00007ffe2ad57a7f R14: 00007ff279643300 R15: 0000000000022000 [ 707.262825] FAULT_INJECTION: forcing a failure. [ 707.262825] name failslab, interval 1, probability 0, space 0, times 0 [ 707.265485] CPU: 1 PID: 6387 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 707.266979] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 707.268783] Call Trace: [ 707.269358] dump_stack+0x107/0x167 [ 707.270154] should_fail.cold+0x5/0xa [ 707.270984] ? ext4_alloc_inode+0x1a/0x670 [ 707.271900] should_failslab+0x5/0x20 [ 707.272723] kmem_cache_alloc+0x5b/0x310 [ 707.273604] ? lock_acquire+0x197/0x470 [ 707.274470] ? ext4_init_journal_params+0x350/0x350 [ 707.275559] ext4_alloc_inode+0x1a/0x670 [ 707.276438] ? ext4_init_journal_params+0x350/0x350 [ 707.277517] alloc_inode+0x63/0x240 [ 707.278302] new_inode+0x23/0x250 [ 707.279066] __ext4_new_inode+0x32c/0x5370 [ 707.279982] ? __lockdep_reset_lock+0x180/0x180 [ 707.280996] ? trace_hardirqs_on+0x5b/0x180 [ 707.281969] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 707.283018] ? do_raw_spin_lock+0x121/0x260 [ 707.283958] ? dquot_initialize_needed+0x290/0x290 [ 707.285016] ? do_raw_spin_unlock+0x4f/0x220 [ 707.285971] ? d_splice_alias+0x4d0/0xc60 [ 707.286879] ext4_create+0x2ce/0x4d0 [ 707.287706] ? ext4_mknod+0x4e0/0x4e0 [ 707.288544] ? ext4_mknod+0x4e0/0x4e0 [ 707.289371] lookup_open.isra.0+0xea8/0x1270 [ 707.290028] FAULT_INJECTION: forcing a failure. [ 707.290028] name failslab, interval 1, probability 0, space 0, times 0 [ 707.290328] ? vfs_tmpfile+0x350/0x350 [ 707.293642] path_openat+0x972/0x2770 [ 707.294478] ? path_lookupat+0x860/0x860 [ 707.295365] ? perf_trace_lock+0xac/0x490 [ 707.296261] ? lock_acquire+0x197/0x470 [ 707.297122] ? find_held_lock+0x2c/0x110 [ 707.298003] ? __lockdep_reset_lock+0x180/0x180 [ 707.299027] do_filp_open+0x190/0x3e0 [ 707.299848] ? may_open_dev+0xf0/0xf0 [ 707.300677] ? do_raw_spin_lock+0x121/0x260 [ 707.301608] ? rwlock_bug.part.0+0x90/0x90 [ 707.302537] ? _raw_spin_unlock+0x1a/0x30 [ 707.303441] ? alloc_fd+0x2e7/0x670 [ 707.304245] do_sys_openat2+0x171/0x4d0 [ 707.305109] ? build_open_flags+0x6f0/0x6f0 [ 707.306041] ? wait_for_completion_io+0x270/0x270 [ 707.307096] ? rcu_read_lock_any_held+0x75/0xa0 [ 707.308096] ? vfs_write+0x354/0xb10 [ 707.308911] __x64_sys_creat+0xc9/0x120 [ 707.309772] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 707.310853] ? __ia32_sys_read+0xb0/0xb0 [ 707.311741] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 707.312878] ? syscall_enter_from_user_mode+0x1d/0x50 [ 707.313992] ? trace_hardirqs_on+0x5b/0x180 [ 707.314938] do_syscall_64+0x33/0x40 [ 707.315744] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 707.316860] RIP: 0033:0x7fcf914ffb19 [ 707.317661] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 707.321651] RSP: 002b:00007fcf8ea75188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 707.323306] RAX: ffffffffffffffda RBX: 00007fcf91612f60 RCX: 00007fcf914ffb19 [ 707.324850] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 707.326391] RBP: 00007fcf8ea751d0 R08: 0000000000000000 R09: 0000000000000000 [ 707.327939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 707.329479] R13: 00007ffd78c3ee2f R14: 00007fcf8ea75300 R15: 0000000000022000 [ 707.331071] CPU: 0 PID: 6383 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 707.332612] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 707.334455] Call Trace: [ 707.335062] dump_stack+0x107/0x167 [ 707.335881] should_fail.cold+0x5/0xa [ 707.336735] ? create_object.isra.0+0x3a/0xa20 [ 707.337751] should_failslab+0x5/0x20 [ 707.338601] kmem_cache_alloc+0x5b/0x310 [ 707.339516] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 707.340742] create_object.isra.0+0x3a/0xa20 [ 707.341718] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 707.342854] kmem_cache_alloc+0x159/0x310 [ 707.343792] security_file_alloc+0x34/0x170 [ 707.344754] __alloc_file+0xb7/0x320 [ 707.345587] alloc_empty_file+0x6d/0x170 [ 707.346493] path_openat+0xe6/0x2770 [ 707.347335] ? __lock_acquire+0x1657/0x5b00 [ 707.348309] ? path_lookupat+0x860/0x860 [ 707.349213] ? perf_trace_lock+0xac/0x490 [ 707.350131] ? lock_acquire+0x197/0x470 [ 707.351021] ? find_held_lock+0x2c/0x110 [ 707.351927] ? __lockdep_reset_lock+0x180/0x180 [ 707.352967] do_filp_open+0x190/0x3e0 [ 707.353811] ? may_open_dev+0xf0/0xf0 [ 707.354664] ? alloc_fd+0x2e7/0x670 [ 707.355481] ? lock_downgrade+0x6d0/0x6d0 [ 707.356399] ? do_raw_spin_lock+0x121/0x260 [ 707.357356] ? rwlock_bug.part.0+0x90/0x90 [ 707.358310] ? _raw_spin_unlock+0x1a/0x30 [ 707.359236] ? alloc_fd+0x2e7/0x670 [ 707.360062] do_sys_openat2+0x171/0x4d0 [ 707.360952] ? build_open_flags+0x6f0/0x6f0 [ 707.361912] ? wait_for_completion_io+0x270/0x270 [ 707.362995] ? rcu_read_lock_any_held+0x75/0xa0 [ 707.364025] ? vfs_write+0x354/0xb10 [ 707.364862] __x64_sys_creat+0xc9/0x120 [ 707.365747] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 707.366850] ? __ia32_sys_read+0xb0/0xb0 [ 707.367769] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 707.368931] ? syscall_enter_from_user_mode+0x1d/0x50 [ 707.370073] ? trace_hardirqs_on+0x5b/0x180 [ 707.371044] do_syscall_64+0x33/0x40 [ 707.371871] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 707.373005] RIP: 0033:0x7fdebd7f1b19 [ 707.373832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 707.377913] RSP: 002b:00007fdebad67188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 707.379612] RAX: ffffffffffffffda RBX: 00007fdebd904f60 RCX: 00007fdebd7f1b19 [ 707.381192] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 707.382770] RBP: 00007fdebad671d0 R08: 0000000000000000 R09: 0000000000000000 [ 707.384355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 707.385931] R13: 00007ffce3c54b0f R14: 00007fdebad67300 R15: 0000000000022000 [ 707.459612] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 707.460850] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 707.463048] Buffer I/O error on dev sr0, logical block 0, async page read [ 707.464927] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 707.466240] blk_update_request: I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 707.468415] Buffer I/O error on dev sr0, logical block 1, async page read [ 707.470432] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 707.473399] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 707.475001] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 707.479619] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 707.481583] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 707.483583] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 19:00:33 executing program 5: r0 = syz_io_uring_setup(0x4d4d, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:00:33 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r1, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) syz_io_uring_setup(0x29a0, &(0x7f0000000040)={0x0, 0x8902, 0x20, 0x1, 0xbb, 0x0, r1}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000180)) r2 = syz_open_dev$char_usb(0xc, 0xb4, 0x4) ioctl$BTRFS_IOC_DEFRAG(r2, 0x50009402, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) dup3(r0, r3, 0x0) syz_open_procfs(0x0, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000100), &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, &(0x7f0000002a40)) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x8000000) mkdir(&(0x7f0000000000)='./file1\x00', 0x10) 19:00:33 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) (fail_nth: 8) 19:00:33 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000200), 0x24, 0x0) 19:00:33 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$sock_timeval(r1, 0x1, 0x43, &(0x7f0000000040)={0x0, 0xea60}, 0x10) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f00000000c0)=0x6, 0x4) perf_event_open$cgroup(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x7, 0x7, 0x4, 0x0, 0x8, 0x8, 0xc, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f0000000180), 0x2}, 0x8000, 0x4, 0x4786c2f7, 0x1, 0xffffffff, 0x23, 0x773, 0x0, 0x0, 0x0, 0x7e}, 0xffffffffffffffff, 0x4, r0, 0x8) dup3(r1, r0, 0x0) sendmsg$inet6(r1, &(0x7f00000006c0)={0x0, 0x31, &(0x7f0000000540)=[{&(0x7f0000000100)=':\x00', 0xfffffdef}], 0x1}, 0x10044001) syz_open_procfs(0x0, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) fadvise64(r2, 0x9, 0x100000000, 0x2) getpgid(0xffffffffffffffff) r3 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0x8, 0x4, @tid=r3}, &(0x7f0000000000)) 19:00:33 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) (fail_nth: 11) 19:00:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 19:00:33 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) (fail_nth: 16) [ 725.484821] FAULT_INJECTION: forcing a failure. [ 725.484821] name failslab, interval 1, probability 0, space 0, times 0 [ 725.484977] FAULT_INJECTION: forcing a failure. [ 725.484977] name failslab, interval 1, probability 0, space 0, times 0 [ 725.487166] CPU: 0 PID: 6407 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 725.491732] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 725.493400] Call Trace: [ 725.493929] dump_stack+0x107/0x167 [ 725.494663] should_fail.cold+0x5/0xa [ 725.495445] ? create_object.isra.0+0x3a/0xa20 [ 725.496368] should_failslab+0x5/0x20 [ 725.497133] kmem_cache_alloc+0x5b/0x310 [ 725.497968] create_object.isra.0+0x3a/0xa20 [ 725.498839] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 725.499877] kmem_cache_alloc+0x159/0x310 [ 725.500716] jbd2__journal_start+0x190/0x7e0 [ 725.501595] __ext4_journal_start_sb+0x214/0x390 [ 725.502568] __ext4_new_inode+0x2e0b/0x5370 [ 725.503462] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 725.504414] ? do_raw_spin_lock+0x121/0x260 [ 725.505281] ? dquot_initialize_needed+0x290/0x290 [ 725.506266] ? do_raw_spin_unlock+0x4f/0x220 [ 725.507165] ? d_splice_alias+0x4d0/0xc60 [ 725.508013] ext4_create+0x2ce/0x4d0 [ 725.508777] ? ext4_mknod+0x4e0/0x4e0 [ 725.509544] ? ext4_mknod+0x4e0/0x4e0 [ 725.510301] lookup_open.isra.0+0xea8/0x1270 [ 725.511197] ? vfs_tmpfile+0x350/0x350 [ 725.512018] path_openat+0x972/0x2770 [ 725.512789] ? path_lookupat+0x860/0x860 [ 725.513599] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 725.514644] ? lock_acquire+0x197/0x470 [ 725.515439] ? find_held_lock+0x2c/0x110 [ 725.516257] do_filp_open+0x190/0x3e0 [ 725.517009] ? may_open_dev+0xf0/0xf0 [ 725.517770] ? do_raw_spin_lock+0x121/0x260 [ 725.518627] ? rwlock_bug.part.0+0x90/0x90 [ 725.519487] ? _raw_spin_unlock+0x1a/0x30 [ 725.520311] ? alloc_fd+0x2e7/0x670 [ 725.521044] do_sys_openat2+0x171/0x4d0 [ 725.521841] ? build_open_flags+0x6f0/0x6f0 [ 725.522693] ? __mutex_unlock_slowpath+0xe1/0x600 [ 725.523664] ? wait_for_completion_io+0x270/0x270 [ 725.524641] __x64_sys_openat+0x13f/0x1f0 [ 725.525460] ? __ia32_sys_open+0x1c0/0x1c0 [ 725.526314] ? ksys_write+0x1a9/0x260 [ 725.527105] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 725.528176] ? syscall_enter_from_user_mode+0x1d/0x50 [ 725.529252] do_syscall_64+0x33/0x40 [ 725.530054] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 725.531064] RIP: 0033:0x7ff27c0cdb19 [ 725.531868] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 725.535691] RSP: 002b:00007ff279643188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 725.537201] RAX: ffffffffffffffda RBX: 00007ff27c1e0f60 RCX: 00007ff27c0cdb19 [ 725.538730] RDX: 0000000000105142 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 725.540197] RBP: 00007ff2796431d0 R08: 0000000000000000 R09: 0000000000000000 [ 725.541606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 725.543018] R13: 00007ffe2ad57a7f R14: 00007ff279643300 R15: 0000000000022000 [ 725.544589] CPU: 1 PID: 6409 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 725.546314] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 725.548388] Call Trace: [ 725.549090] dump_stack+0x107/0x167 [ 725.549984] should_fail.cold+0x5/0xa [ 725.550911] ? ext4_alloc_inode+0x1a/0x670 [ 725.551946] should_failslab+0x5/0x20 [ 725.552868] kmem_cache_alloc+0x5b/0x310 [ 725.553897] ? lock_acquire+0x197/0x470 [ 725.554878] ? ext4_init_journal_params+0x350/0x350 [ 725.556124] ext4_alloc_inode+0x1a/0x670 [ 725.557120] ? ext4_init_journal_params+0x350/0x350 [ 725.558346] alloc_inode+0x63/0x240 [ 725.559257] new_inode+0x23/0x250 [ 725.560110] __ext4_new_inode+0x32c/0x5370 [ 725.561146] ? trace_hardirqs_on+0x5b/0x180 [ 725.562220] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 725.563404] ? do_raw_spin_lock+0x121/0x260 [ 725.564465] ? dquot_initialize_needed+0x290/0x290 [ 725.565661] ? do_raw_spin_unlock+0x4f/0x220 [ 725.566736] ? d_splice_alias+0x4d0/0xc60 [ 725.567771] ext4_create+0x2ce/0x4d0 [ 725.568683] ? ext4_mknod+0x4e0/0x4e0 [ 725.569613] ? ext4_mknod+0x4e0/0x4e0 [ 725.570542] lookup_open.isra.0+0xea8/0x1270 [ 725.571614] ? vfs_tmpfile+0x350/0x350 [ 725.572595] path_openat+0x972/0x2770 [ 725.573530] ? path_lookupat+0x860/0x860 [ 725.574520] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 725.575823] ? lock_acquire+0x197/0x470 [ 725.576805] ? find_held_lock+0x2c/0x110 [ 725.577804] do_filp_open+0x190/0x3e0 [ 725.578724] ? may_open_dev+0xf0/0xf0 [ 725.579663] ? do_raw_spin_lock+0x121/0x260 [ 725.580702] ? rwlock_bug.part.0+0x90/0x90 [ 725.581740] ? _raw_spin_unlock+0x1a/0x30 [ 725.582774] ? alloc_fd+0x2e7/0x670 [ 725.583700] do_sys_openat2+0x171/0x4d0 [ 725.584665] ? build_open_flags+0x6f0/0x6f0 [ 725.585706] ? wait_for_completion_io+0x270/0x270 [ 725.586877] ? rcu_read_lock_any_held+0x75/0xa0 [ 725.588003] ? vfs_write+0x354/0xb10 [ 725.588914] __x64_sys_creat+0xc9/0x120 [ 725.589877] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 725.591079] ? __ia32_sys_read+0xb0/0xb0 [ 725.592070] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 725.593334] ? syscall_enter_from_user_mode+0x1d/0x50 [ 725.594576] ? trace_hardirqs_on+0x5b/0x180 [ 725.595621] do_syscall_64+0x33/0x40 [ 725.596518] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 725.597751] RIP: 0033:0x7fcf914ffb19 [ 725.598655] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 725.603080] RSP: 002b:00007fcf8ea75188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 725.604918] RAX: ffffffffffffffda RBX: 00007fcf91612f60 RCX: 00007fcf914ffb19 [ 725.606638] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 725.608358] RBP: 00007fcf8ea751d0 R08: 0000000000000000 R09: 0000000000000000 [ 725.610068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 725.611791] R13: 00007ffd78c3ee2f R14: 00007fcf8ea75300 R15: 0000000000022000 [ 725.623673] FAULT_INJECTION: forcing a failure. [ 725.623673] name failslab, interval 1, probability 0, space 0, times 0 [ 725.626734] CPU: 1 PID: 6404 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 725.628382] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 725.630358] Call Trace: [ 725.630993] dump_stack+0x107/0x167 [ 725.631879] should_fail.cold+0x5/0xa [ 725.632788] ? jbd2__journal_start+0x190/0x7e0 [ 725.633871] should_failslab+0x5/0x20 [ 725.634778] kmem_cache_alloc+0x5b/0x310 [ 725.635758] jbd2__journal_start+0x190/0x7e0 [ 725.636819] __ext4_journal_start_sb+0x214/0x390 [ 725.637961] ext4_truncate+0x665/0x1160 [ 725.638919] ? unmap_mapping_pages+0x117/0x2a0 [ 725.640025] ? ext4_punch_hole+0x1070/0x1070 [ 725.641067] ext4_setattr+0x1659/0x20f0 [ 725.642008] ? igrab+0xc0/0xc0 [ 725.642773] ? ext4_journalled_write_end+0x1190/0x1190 [ 725.644025] notify_change+0xc28/0x1160 [ 725.645187] ? cap_bprm_creds_from_file+0x17a0/0x27c0 [ 725.646661] do_truncate+0x134/0x1f0 [ 725.647554] ? file_open_root+0x440/0x440 [ 725.648554] ? may_open+0x1e4/0x400 [ 725.649424] path_openat+0x1dcd/0x2770 [ 725.650353] ? path_lookupat+0x860/0x860 [ 725.651315] ? perf_trace_lock+0xac/0x490 [ 725.652287] ? lock_acquire+0x197/0x470 [ 725.653225] ? find_held_lock+0x2c/0x110 [ 725.654183] ? __lockdep_reset_lock+0x180/0x180 [ 725.655289] do_filp_open+0x190/0x3e0 [ 725.656187] ? may_open_dev+0xf0/0xf0 [ 725.657096] ? do_raw_spin_lock+0x121/0x260 [ 725.658113] ? rwlock_bug.part.0+0x90/0x90 [ 725.659117] ? _raw_spin_unlock+0x1a/0x30 [ 725.660093] ? alloc_fd+0x2e7/0x670 [ 725.660959] do_sys_openat2+0x171/0x4d0 [ 725.661883] ? build_open_flags+0x6f0/0x6f0 [ 725.662883] ? wait_for_completion_io+0x270/0x270 [ 725.664012] ? rcu_read_lock_any_held+0x75/0xa0 [ 725.665090] ? vfs_write+0x354/0xb10 [ 725.665963] __x64_sys_creat+0xc9/0x120 [ 725.666892] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 725.668054] ? __ia32_sys_read+0xb0/0xb0 [ 725.669014] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 725.670239] ? syscall_enter_from_user_mode+0x1d/0x50 [ 725.671445] ? trace_hardirqs_on+0x5b/0x180 [ 725.672455] do_syscall_64+0x33/0x40 [ 725.673332] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 725.674796] RIP: 0033:0x7fdebd7f1b19 [ 725.675887] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 725.680735] RSP: 002b:00007fdebad67188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 725.682778] RAX: ffffffffffffffda RBX: 00007fdebd904f60 RCX: 00007fdebd7f1b19 [ 725.684887] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 725.686751] RBP: 00007fdebad671d0 R08: 0000000000000000 R09: 0000000000000000 [ 725.688648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 725.690624] R13: 00007ffce3c54b0f R14: 00007fdebad67300 R15: 0000000000022000 [ 725.692975] EXT4-fs error (device sda) in ext4_setattr:5676: Out of memory 19:00:34 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000200), 0x24, 0x0) 19:00:34 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) (fail_nth: 17) 19:00:34 executing program 5: r0 = syz_io_uring_setup(0x4d4d, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:00:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 725.933954] FAULT_INJECTION: forcing a failure. [ 725.933954] name failslab, interval 1, probability 0, space 0, times 0 [ 725.937679] CPU: 1 PID: 6424 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 725.939325] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 725.941325] Call Trace: [ 725.941966] dump_stack+0x107/0x167 [ 725.942853] should_fail.cold+0x5/0xa [ 725.943792] ? create_object.isra.0+0x3a/0xa20 [ 725.944894] should_failslab+0x5/0x20 [ 725.945815] kmem_cache_alloc+0x5b/0x310 [ 725.946809] ? sidtab_sid2str_get+0x65/0x720 [ 725.947890] create_object.isra.0+0x3a/0xa20 [ 725.949095] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 725.950348] __kmalloc_track_caller+0x177/0x370 [ 725.951498] ? sidtab_sid2str_get+0x17e/0x720 [ 725.952592] kmemdup+0x23/0x50 [ 725.953379] sidtab_sid2str_get+0x17e/0x720 [ 725.954424] sidtab_entry_to_string+0x33/0x110 [ 725.955575] security_sid_to_context_core+0x33c/0x5d0 [ 725.956832] selinux_inode_init_security+0x4ab/0x690 [ 725.958067] ? selinux_dentry_init_security+0x280/0x280 [ 725.959359] ? get_cached_acl_rcu+0x120/0x120 [ 725.960447] ? find_held_lock+0x2c/0x110 [ 725.961439] security_inode_init_security+0x151/0x360 [ 725.962687] ? ext4_init_acl+0x310/0x310 [ 725.963685] ? inode_free_by_rcu+0x20/0x20 [ 725.964727] ? chksum_update+0x4c/0xb0 [ 725.965679] __ext4_new_inode+0x386e/0x5370 [ 725.966774] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 725.967934] ? do_raw_spin_lock+0x121/0x260 [ 725.968973] ? dquot_initialize_needed+0x290/0x290 [ 725.970135] ? do_raw_spin_unlock+0x4f/0x220 [ 725.971192] ? d_splice_alias+0x4d0/0xc60 [ 725.972191] ext4_create+0x2ce/0x4d0 [ 725.973090] ? ext4_mknod+0x4e0/0x4e0 [ 725.974012] ? ext4_mknod+0x4e0/0x4e0 [ 725.974917] lookup_open.isra.0+0xea8/0x1270 [ 725.975984] ? vfs_tmpfile+0x350/0x350 [ 725.976953] path_openat+0x972/0x2770 [ 725.977875] ? path_lookupat+0x860/0x860 [ 725.978844] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 725.980106] ? lock_acquire+0x197/0x470 [ 725.981049] ? find_held_lock+0x2c/0x110 [ 725.982027] do_filp_open+0x190/0x3e0 [ 725.982926] ? may_open_dev+0xf0/0xf0 [ 725.983839] ? do_raw_spin_lock+0x121/0x260 [ 725.984855] ? rwlock_bug.part.0+0x90/0x90 [ 725.985853] ? _raw_spin_unlock+0x1a/0x30 [ 725.986825] ? alloc_fd+0x2e7/0x670 [ 725.987704] do_sys_openat2+0x171/0x4d0 [ 725.988640] ? build_open_flags+0x6f0/0x6f0 [ 725.989658] ? __mutex_unlock_slowpath+0xe1/0x600 [ 725.990801] ? wait_for_completion_io+0x270/0x270 [ 725.991971] __x64_sys_openat+0x13f/0x1f0 [ 725.992958] ? __ia32_sys_open+0x1c0/0x1c0 [ 725.993958] ? ksys_write+0x1a9/0x260 [ 725.994866] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 725.996116] ? syscall_enter_from_user_mode+0x1d/0x50 [ 725.997328] do_syscall_64+0x33/0x40 [ 725.998199] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 725.999429] RIP: 0033:0x7ff27c0cdb19 [ 726.000303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 726.004578] RSP: 002b:00007ff279643188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 726.006356] RAX: ffffffffffffffda RBX: 00007ff27c1e0f60 RCX: 00007ff27c0cdb19 [ 726.008039] RDX: 0000000000105142 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 726.009716] RBP: 00007ff2796431d0 R08: 0000000000000000 R09: 0000000000000000 [ 726.011381] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 726.013037] R13: 00007ffe2ad57a7f R14: 00007ff279643300 R15: 0000000000022000 19:00:47 executing program 5: r0 = syz_io_uring_setup(0x4d4d, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:00:47 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 19:00:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 19:00:47 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) (fail_nth: 9) 19:00:47 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r1, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) syz_io_uring_setup(0x29a0, &(0x7f0000000040)={0x0, 0x8902, 0x20, 0x1, 0xbb, 0x0, r1}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000180)) r2 = syz_open_dev$char_usb(0xc, 0xb4, 0x4) ioctl$BTRFS_IOC_DEFRAG(r2, 0x50009402, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) dup3(r0, r3, 0x0) syz_open_procfs(0x0, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000100), &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, &(0x7f0000002a40)) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x8000000) mkdir(&(0x7f0000000000)='./file1\x00', 0x10) 19:00:47 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0, 0x0}) capset(&(0x7f0000000180)={0x20080522, r0}, &(0x7f00000002c0)={0x40, 0x2, 0xfffffaf2, 0x6, 0xffffffff, 0x40}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/locks\x00', 0x0, 0x0) acct(&(0x7f00000000c0)='./file0\x00') r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r3, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r3, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) sendmmsg$inet(r3, 0xfffffffffffffffd, 0x0, 0x4000000) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000040)=0x20) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='wlan1\x00', 0x10) sendfile(r1, r2, 0x0, 0x6) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x3}, 0x0, 0x0, 0x145, 0xf, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget(0x1, 0x0) move_pages(0x0, 0x2344, &(0x7f0000000080)=[&(0x7f0000ffe000/0x2000)=nil], 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x0) 19:00:47 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) (fail_nth: 12) 19:00:47 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) (fail_nth: 18) [ 739.749283] FAULT_INJECTION: forcing a failure. [ 739.749283] name failslab, interval 1, probability 0, space 0, times 0 [ 739.752184] CPU: 1 PID: 6447 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 739.753908] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 739.756011] Call Trace: [ 739.756680] dump_stack+0x107/0x167 [ 739.757607] should_fail.cold+0x5/0xa [ 739.758573] ? ___slab_alloc+0x470/0x700 [ 739.759615] ? create_object.isra.0+0x3a/0xa20 [ 739.760705] should_failslab+0x5/0x20 [ 739.761567] kmem_cache_alloc+0x5b/0x310 [ 739.762493] create_object.isra.0+0x3a/0xa20 [ 739.763481] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 739.764632] __kmalloc_track_caller+0x177/0x370 [ 739.765683] ? sidtab_sid2str_get+0x17e/0x720 [ 739.766689] kmemdup+0x23/0x50 [ 739.767425] sidtab_sid2str_get+0x17e/0x720 [ 739.768409] sidtab_entry_to_string+0x33/0x110 [ 739.769441] security_sid_to_context_core+0x33c/0x5d0 [ 739.770606] selinux_inode_init_security+0x4ab/0x690 [ 739.771756] ? selinux_dentry_init_security+0x280/0x280 [ 739.772946] ? get_cached_acl_rcu+0x120/0x120 [ 739.773954] ? find_held_lock+0x2c/0x110 [ 739.774875] security_inode_init_security+0x151/0x360 [ 739.776042] ? ext4_init_acl+0x310/0x310 [ 739.776952] ? inode_free_by_rcu+0x20/0x20 [ 739.777924] ? chksum_update+0x4c/0xb0 [ 739.778806] __ext4_new_inode+0x386e/0x5370 [ 739.779814] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 739.780895] ? do_raw_spin_lock+0x121/0x260 [ 739.781864] ? dquot_initialize_needed+0x290/0x290 [ 739.782972] ? do_raw_spin_unlock+0x4f/0x220 [ 739.783965] ? d_splice_alias+0x4d0/0xc60 [ 739.784908] ext4_create+0x2ce/0x4d0 [ 739.785756] ? ext4_mknod+0x4e0/0x4e0 [ 739.786617] ? ext4_mknod+0x4e0/0x4e0 [ 739.787488] lookup_open.isra.0+0xea8/0x1270 [ 739.788483] ? vfs_tmpfile+0x350/0x350 [ 739.789407] path_openat+0x972/0x2770 [ 739.790277] ? path_lookupat+0x860/0x860 [ 739.791194] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 739.792375] ? lock_acquire+0x197/0x470 [ 739.793267] ? find_held_lock+0x2c/0x110 [ 739.794200] do_filp_open+0x190/0x3e0 [ 739.795051] ? may_open_dev+0xf0/0xf0 [ 739.795936] ? do_raw_spin_lock+0x121/0x260 [ 739.796904] ? rwlock_bug.part.0+0x90/0x90 [ 739.797856] ? _raw_spin_unlock+0x1a/0x30 [ 739.798781] ? alloc_fd+0x2e7/0x670 [ 739.799627] do_sys_openat2+0x171/0x4d0 [ 739.800524] ? build_open_flags+0x6f0/0x6f0 [ 739.801492] ? __mutex_unlock_slowpath+0xe1/0x600 [ 739.802576] ? wait_for_completion_io+0x270/0x270 [ 739.803677] __x64_sys_openat+0x13f/0x1f0 [ 739.804613] ? __ia32_sys_open+0x1c0/0x1c0 [ 739.805561] ? ksys_write+0x1a9/0x260 [ 739.806424] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 739.807606] ? syscall_enter_from_user_mode+0x1d/0x50 [ 739.808765] do_syscall_64+0x33/0x40 [ 739.809597] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 739.810736] RIP: 0033:0x7ff27c0cdb19 [ 739.811579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 739.815703] RSP: 002b:00007ff279643188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 739.817408] RAX: ffffffffffffffda RBX: 00007ff27c1e0f60 RCX: 00007ff27c0cdb19 [ 739.819010] RDX: 0000000000105142 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 739.820628] RBP: 00007ff2796431d0 R08: 0000000000000000 R09: 0000000000000000 [ 739.822238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 739.823860] R13: 00007ffe2ad57a7f R14: 00007ff279643300 R15: 0000000000022000 19:00:48 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r2 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 739.837198] FAULT_INJECTION: forcing a failure. [ 739.837198] name failslab, interval 1, probability 0, space 0, times 0 [ 739.839908] CPU: 1 PID: 6451 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 739.841439] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 739.843435] Call Trace: [ 739.844122] dump_stack+0x107/0x167 [ 739.845039] should_fail.cold+0x5/0xa [ 739.845966] ? create_object.isra.0+0x3a/0xa20 [ 739.847190] should_failslab+0x5/0x20 [ 739.848211] kmem_cache_alloc+0x5b/0x310 [ 739.849276] create_object.isra.0+0x3a/0xa20 [ 739.850338] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 739.851589] kmem_cache_alloc+0x159/0x310 [ 739.852514] jbd2__journal_start+0x190/0x7e0 [ 739.853504] __ext4_journal_start_sb+0x214/0x390 [ 739.854576] ext4_truncate+0x665/0x1160 [ 739.855481] ? unmap_mapping_pages+0x117/0x2a0 [ 739.856509] ? ext4_punch_hole+0x1070/0x1070 [ 739.857510] ext4_setattr+0x1659/0x20f0 [ 739.858375] ? igrab+0xc0/0xc0 [ 739.859110] ? ext4_journalled_write_end+0x1190/0x1190 [ 739.860274] notify_change+0xc28/0x1160 [ 739.861172] ? cap_bprm_creds_from_file+0x17a0/0x27c0 [ 739.862339] do_truncate+0x134/0x1f0 [ 739.863170] ? file_open_root+0x440/0x440 [ 739.864128] ? may_open+0x1e4/0x400 [ 739.864943] path_openat+0x1dcd/0x2770 [ 739.865831] ? path_lookupat+0x860/0x860 [ 739.866744] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 739.867911] ? lock_acquire+0x197/0x470 [ 739.868805] ? find_held_lock+0x2c/0x110 [ 739.869727] do_filp_open+0x190/0x3e0 [ 739.870586] ? may_open_dev+0xf0/0xf0 [ 739.871457] ? do_raw_spin_lock+0x121/0x260 [ 739.872423] ? rwlock_bug.part.0+0x90/0x90 [ 739.873380] ? _raw_spin_unlock+0x1a/0x30 [ 739.874286] ? alloc_fd+0x2e7/0x670 [ 739.875113] do_sys_openat2+0x171/0x4d0 [ 739.876013] ? build_open_flags+0x6f0/0x6f0 [ 739.876993] ? wait_for_completion_io+0x270/0x270 [ 739.878075] ? rcu_read_lock_any_held+0x75/0xa0 [ 739.879112] ? vfs_write+0x354/0xb10 [ 739.879967] __x64_sys_creat+0xc9/0x120 [ 739.880867] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 739.881984] ? __ia32_sys_read+0xb0/0xb0 [ 739.882902] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 739.884082] ? syscall_enter_from_user_mode+0x1d/0x50 [ 739.885228] ? trace_hardirqs_on+0x5b/0x180 [ 739.886198] do_syscall_64+0x33/0x40 [ 739.887026] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 739.888183] RIP: 0033:0x7fdebd7f1b19 [ 739.889022] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 739.893105] RSP: 002b:00007fdebad46188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 739.894810] RAX: ffffffffffffffda RBX: 00007fdebd905020 RCX: 00007fdebd7f1b19 [ 739.896417] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 739.898012] RBP: 00007fdebad461d0 R08: 0000000000000000 R09: 0000000000000000 [ 739.899616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 739.901222] R13: 00007ffce3c54b0f R14: 00007fdebad46300 R15: 0000000000022000 [ 739.908957] FAULT_INJECTION: forcing a failure. [ 739.908957] name failslab, interval 1, probability 0, space 0, times 0 [ 739.911581] CPU: 1 PID: 6454 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 739.913086] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 739.914978] Call Trace: [ 739.915579] dump_stack+0x107/0x167 [ 739.916394] should_fail.cold+0x5/0xa [ 739.917227] ? security_inode_alloc+0x34/0x160 [ 739.918253] should_failslab+0x5/0x20 [ 739.919091] kmem_cache_alloc+0x5b/0x310 [ 739.920009] security_inode_alloc+0x34/0x160 [ 739.921024] inode_init_always+0xa4e/0xd10 [ 739.921975] alloc_inode+0x84/0x240 [ 739.922793] new_inode+0x23/0x250 [ 739.923587] __ext4_new_inode+0x32c/0x5370 [ 739.924538] ? __lockdep_reset_lock+0x180/0x180 [ 739.925585] ? trace_hardirqs_on+0x5b/0x180 [ 739.926573] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 739.927647] ? do_raw_spin_lock+0x121/0x260 [ 739.928621] ? dquot_initialize_needed+0x290/0x290 [ 739.929741] ? do_raw_spin_unlock+0x4f/0x220 [ 739.930738] ? d_splice_alias+0x4d0/0xc60 [ 739.931677] ext4_create+0x2ce/0x4d0 [ 739.932523] ? ext4_mknod+0x4e0/0x4e0 [ 739.933392] ? ext4_mknod+0x4e0/0x4e0 [ 739.934254] lookup_open.isra.0+0xea8/0x1270 [ 739.935248] ? vfs_tmpfile+0x350/0x350 [ 739.936164] path_openat+0x972/0x2770 [ 739.937033] ? path_lookupat+0x860/0x860 [ 739.937945] ? perf_trace_lock+0xac/0x490 [ 739.938865] ? lock_acquire+0x197/0x470 [ 739.939759] ? find_held_lock+0x2c/0x110 [ 739.940675] ? __lockdep_reset_lock+0x180/0x180 [ 739.941732] do_filp_open+0x190/0x3e0 [ 739.942581] ? may_open_dev+0xf0/0xf0 [ 739.943450] ? do_raw_spin_lock+0x121/0x260 [ 739.944408] ? rwlock_bug.part.0+0x90/0x90 [ 739.945367] ? _raw_spin_unlock+0x1a/0x30 [ 739.946290] ? alloc_fd+0x2e7/0x670 [ 739.947118] do_sys_openat2+0x171/0x4d0 [ 739.948023] ? build_open_flags+0x6f0/0x6f0 [ 739.948999] ? wait_for_completion_io+0x270/0x270 [ 739.950082] ? rcu_read_lock_any_held+0x75/0xa0 [ 739.951119] ? vfs_write+0x354/0xb10 [ 739.951978] __x64_sys_creat+0xc9/0x120 [ 739.952871] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 739.953993] ? __ia32_sys_read+0xb0/0xb0 [ 739.954922] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 739.956116] ? syscall_enter_from_user_mode+0x1d/0x50 [ 739.957263] ? trace_hardirqs_on+0x5b/0x180 [ 739.958230] do_syscall_64+0x33/0x40 [ 739.959072] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 739.960229] RIP: 0033:0x7fcf914ffb19 [ 739.961072] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 739.965183] RSP: 002b:00007fcf8ea75188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 739.966893] RAX: ffffffffffffffda RBX: 00007fcf91612f60 RCX: 00007fcf914ffb19 [ 739.968485] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 739.970088] RBP: 00007fcf8ea751d0 R08: 0000000000000000 R09: 0000000000000000 [ 739.971692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 739.973290] R13: 00007ffd78c3ee2f R14: 00007fcf8ea75300 R15: 0000000000022000 19:00:48 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 19:00:48 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x20, 0xfa21, 0x0) fork() fork() 19:00:48 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) (fail_nth: 19) 19:00:48 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) (fail_nth: 10) 19:00:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 19:00:48 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) (fail_nth: 13) 19:00:48 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r1, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) syz_io_uring_setup(0x29a0, &(0x7f0000000040)={0x0, 0x8902, 0x20, 0x1, 0xbb, 0x0, r1}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000180)) r2 = syz_open_dev$char_usb(0xc, 0xb4, 0x4) ioctl$BTRFS_IOC_DEFRAG(r2, 0x50009402, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) dup3(r0, r3, 0x0) syz_open_procfs(0x0, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000100), &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, &(0x7f0000002a40)) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x8000000) mkdir(&(0x7f0000000000)='./file1\x00', 0x10) [ 740.188101] FAULT_INJECTION: forcing a failure. [ 740.188101] name failslab, interval 1, probability 0, space 0, times 0 [ 740.189424] CPU: 0 PID: 6467 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 740.190217] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 740.191142] Call Trace: [ 740.191450] dump_stack+0x107/0x167 [ 740.191853] should_fail.cold+0x5/0xa [ 740.192291] ? create_object.isra.0+0x3a/0xa20 [ 740.192792] should_failslab+0x5/0x20 [ 740.193210] kmem_cache_alloc+0x5b/0x310 [ 740.193682] create_object.isra.0+0x3a/0xa20 [ 740.194166] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 740.194749] kmem_cache_alloc+0x159/0x310 [ 740.195233] ext4_inode_attach_jinode+0x114/0x230 [ 740.195776] ext4_file_open+0x302/0xa50 [ 740.196214] ? ext4_file_write_iter+0x1530/0x1530 [ 740.196743] ? selinux_inode_create+0x30/0x30 [ 740.197261] ? lock_downgrade+0x6d0/0x6d0 [ 740.197736] ? do_raw_spin_lock+0x12c/0x260 [ 740.198219] ? fsnotify_perm.part.0+0x22d/0x620 [ 740.198757] do_dentry_open+0x4b7/0x1090 [ 740.199227] ? ext4_file_write_iter+0x1530/0x1530 [ 740.199761] ? may_open+0x1e4/0x400 [ 740.200185] path_openat+0x19ba/0x2770 [ 740.200618] ? path_lookupat+0x860/0x860 [ 740.201087] ? perf_trace_lock+0xac/0x490 [ 740.201541] ? lock_acquire+0x197/0x470 [ 740.202000] ? find_held_lock+0x2c/0x110 [ 740.202477] ? __lockdep_reset_lock+0x180/0x180 [ 740.203020] do_filp_open+0x190/0x3e0 [ 740.203449] ? may_open_dev+0xf0/0xf0 [ 740.203896] ? do_raw_spin_lock+0x121/0x260 [ 740.204370] ? rwlock_bug.part.0+0x90/0x90 [ 740.204844] ? _raw_spin_unlock+0x1a/0x30 [ 740.205296] ? alloc_fd+0x2e7/0x670 [ 740.205722] do_sys_openat2+0x171/0x4d0 [ 740.206181] ? build_open_flags+0x6f0/0x6f0 [ 740.206681] ? __mutex_unlock_slowpath+0xe1/0x600 [ 740.207237] ? wait_for_completion_io+0x270/0x270 [ 740.207771] __x64_sys_openat+0x13f/0x1f0 [ 740.208222] ? __ia32_sys_open+0x1c0/0x1c0 [ 740.208704] ? ksys_write+0x1a9/0x260 [ 740.209125] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 740.209721] ? syscall_enter_from_user_mode+0x1d/0x50 [ 740.210317] do_syscall_64+0x33/0x40 [ 740.210722] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 740.211323] RIP: 0033:0x7ff27c0cdb19 [ 740.211752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 740.213863] RSP: 002b:00007ff279643188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 740.214737] RAX: ffffffffffffffda RBX: 00007ff27c1e0f60 RCX: 00007ff27c0cdb19 [ 740.215548] RDX: 0000000000105142 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 740.216319] RBP: 00007ff2796431d0 R08: 0000000000000000 R09: 0000000000000000 [ 740.217113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 740.217932] R13: 00007ffe2ad57a7f R14: 00007ff279643300 R15: 0000000000022000 [ 740.223689] FAULT_INJECTION: forcing a failure. [ 740.223689] name failslab, interval 1, probability 0, space 0, times 0 [ 740.225001] CPU: 0 PID: 6468 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 740.225779] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 740.226721] Call Trace: [ 740.227015] dump_stack+0x107/0x167 [ 740.227418] should_fail.cold+0x5/0xa [ 740.227853] ? create_object.isra.0+0x3a/0xa20 [ 740.228354] should_failslab+0x5/0x20 [ 740.228788] kmem_cache_alloc+0x5b/0x310 [ 740.229241] create_object.isra.0+0x3a/0xa20 [ 740.229721] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 740.230305] kmem_cache_alloc+0x159/0x310 [ 740.230789] start_this_handle+0x674/0x1390 [ 740.231281] ? kmem_cache_alloc+0x159/0x310 [ 740.231789] ? mark_held_locks+0x9e/0xe0 [ 740.232261] ? __jbd2_journal_unfile_buffer+0xb0/0xb0 [ 740.232852] ? trace_hardirqs_on+0x5b/0x180 [ 740.233349] ? kmem_cache_alloc+0x2a6/0x310 [ 740.233853] jbd2__journal_start+0x390/0x7e0 [ 740.234361] __ext4_journal_start_sb+0x214/0x390 [ 740.234906] ext4_truncate+0x665/0x1160 [ 740.235354] ? unmap_mapping_pages+0x117/0x2a0 [ 740.235876] ? ext4_punch_hole+0x1070/0x1070 [ 740.236359] ext4_setattr+0x1659/0x20f0 [ 740.236814] ? igrab+0xc0/0xc0 [ 740.237171] ? ext4_journalled_write_end+0x1190/0x1190 [ 740.237738] notify_change+0xc28/0x1160 [ 740.238178] ? cap_bprm_creds_from_file+0x17a0/0x27c0 [ 740.238741] do_truncate+0x134/0x1f0 [ 740.239168] ? file_open_root+0x440/0x440 [ 740.239636] ? may_open+0x1e4/0x400 [ 740.240028] path_openat+0x1dcd/0x2770 [ 740.240454] ? path_lookupat+0x860/0x860 [ 740.240892] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 740.241493] ? lock_acquire+0x197/0x470 [ 740.241949] ? find_held_lock+0x2c/0x110 [ 740.242395] do_filp_open+0x190/0x3e0 [ 740.242801] ? may_open_dev+0xf0/0xf0 [ 740.243241] ? do_raw_spin_lock+0x121/0x260 [ 740.243712] ? rwlock_bug.part.0+0x90/0x90 [ 740.244168] ? _raw_spin_unlock+0x1a/0x30 [ 740.244609] ? alloc_fd+0x2e7/0x670 [ 740.245006] do_sys_openat2+0x171/0x4d0 [ 740.245463] ? build_open_flags+0x6f0/0x6f0 [ 740.245950] ? wait_for_completion_io+0x270/0x270 [ 740.246496] ? rcu_read_lock_any_held+0x75/0xa0 [ 740.247025] ? vfs_write+0x354/0xb10 [ 740.247435] __x64_sys_creat+0xc9/0x120 [ 740.247864] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 740.248427] ? __ia32_sys_read+0xb0/0xb0 [ 740.248886] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 740.249447] ? syscall_enter_from_user_mode+0x1d/0x50 [ 740.250000] ? trace_hardirqs_on+0x5b/0x180 [ 740.250495] do_syscall_64+0x33/0x40 [ 740.250922] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 740.251510] RIP: 0033:0x7fdebd7f1b19 [ 740.251914] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 740.253986] RSP: 002b:00007fdebad67188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 740.254840] RAX: ffffffffffffffda RBX: 00007fdebd904f60 RCX: 00007fdebd7f1b19 [ 740.255613] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 740.256380] RBP: 00007fdebad671d0 R08: 0000000000000000 R09: 0000000000000000 [ 740.257149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 740.257934] R13: 00007ffce3c54b0f R14: 00007fdebad67300 R15: 0000000000022000 [ 740.277395] FAULT_INJECTION: forcing a failure. [ 740.277395] name failslab, interval 1, probability 0, space 0, times 0 [ 740.280059] CPU: 1 PID: 6472 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 740.281712] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 740.283475] Call Trace: [ 740.284028] dump_stack+0x107/0x167 [ 740.284786] should_fail.cold+0x5/0xa [ 740.285579] ? create_object.isra.0+0x3a/0xa20 [ 740.286525] should_failslab+0x5/0x20 [ 740.287338] kmem_cache_alloc+0x5b/0x310 [ 740.288222] create_object.isra.0+0x3a/0xa20 [ 740.289151] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 740.290226] kmem_cache_alloc+0x159/0x310 [ 740.291101] security_inode_alloc+0x34/0x160 [ 740.292061] inode_init_always+0xa4e/0xd10 [ 740.292945] alloc_inode+0x84/0x240 [ 740.293711] new_inode+0x23/0x250 [ 740.294450] __ext4_new_inode+0x32c/0x5370 [ 740.295367] ? trace_hardirqs_on+0x5b/0x180 [ 740.296320] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 740.297330] ? do_raw_spin_lock+0x121/0x260 [ 740.298235] ? dquot_initialize_needed+0x290/0x290 [ 740.299254] ? do_raw_spin_unlock+0x4f/0x220 [ 740.300197] ? d_splice_alias+0x4d0/0xc60 [ 740.301075] ext4_create+0x2ce/0x4d0 [ 740.301876] ? ext4_mknod+0x4e0/0x4e0 [ 740.302692] ? ext4_mknod+0x4e0/0x4e0 [ 740.303534] lookup_open.isra.0+0xea8/0x1270 [ 740.304471] ? vfs_tmpfile+0x350/0x350 [ 740.305332] path_openat+0x972/0x2770 [ 740.306143] ? path_lookupat+0x860/0x860 [ 740.307000] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 740.308132] ? lock_acquire+0x197/0x470 [ 740.308965] ? find_held_lock+0x2c/0x110 [ 740.309828] do_filp_open+0x190/0x3e0 [ 740.310621] ? may_open_dev+0xf0/0xf0 [ 740.311454] ? do_raw_spin_lock+0x121/0x260 [ 740.312360] ? rwlock_bug.part.0+0x90/0x90 [ 740.313250] ? _raw_spin_unlock+0x1a/0x30 [ 740.314108] ? alloc_fd+0x2e7/0x670 [ 740.314890] do_sys_openat2+0x171/0x4d0 [ 740.315779] ? build_open_flags+0x6f0/0x6f0 [ 740.316683] ? wait_for_completion_io+0x270/0x270 [ 740.317695] ? rcu_read_lock_any_held+0x75/0xa0 [ 740.318665] ? vfs_write+0x354/0xb10 [ 740.319480] __x64_sys_creat+0xc9/0x120 [ 740.320308] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 740.321352] ? __ia32_sys_read+0xb0/0xb0 [ 740.322207] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 740.323322] ? syscall_enter_from_user_mode+0x1d/0x50 [ 740.324417] ? trace_hardirqs_on+0x5b/0x180 [ 740.325319] do_syscall_64+0x33/0x40 [ 740.326107] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 740.327180] RIP: 0033:0x7fcf914ffb19 [ 740.327991] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 740.331901] RSP: 002b:00007fcf8ea75188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 740.333512] RAX: ffffffffffffffda RBX: 00007fcf91612f60 RCX: 00007fcf914ffb19 [ 740.335002] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 740.336535] RBP: 00007fcf8ea751d0 R08: 0000000000000000 R09: 0000000000000000 [ 740.338018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 740.339531] R13: 00007ffd78c3ee2f R14: 00007fcf8ea75300 R15: 0000000000022000 19:00:48 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r2 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:00:48 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 19:01:02 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) (fail_nth: 11) 19:01:02 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) (fail_nth: 20) 19:01:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 19:01:02 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) (fail_nth: 14) 19:01:02 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = fork() ptrace$setopts(0x4206, r1, 0x10001, 0x3d) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7f, 0x4, 0xb3, 0xb2, 0x0, 0xfff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5a8, 0x2, @perf_config_ext={0x3ff, 0x96}, 0x220, 0xcc, 0x7f, 0x2, 0x469, 0x4, 0x4, 0x0, 0xe525, 0x0, 0x8523}, r1, 0x5, r0, 0x3) getsockname(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000000)=0x80) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) creat(&(0x7f0000000040)='./file0\x00', 0x0) 19:01:02 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000002000000483600000000000200"/32], 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r1, 0x409, 0xe) fallocate(r1, 0x0, 0x0, 0x4) dup3(r0, r1, 0x80000) 19:01:02 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r2 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:01:02 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 1) [ 754.587750] FAULT_INJECTION: forcing a failure. [ 754.587750] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 754.592193] CPU: 1 PID: 6495 Comm: syz-executor.7 Not tainted 5.10.240 #1 [ 754.594057] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 754.597224] Call Trace: [ 754.598042] dump_stack+0x107/0x167 [ 754.599168] should_fail.cold+0x5/0xa [ 754.600361] _copy_to_user+0x2e/0x180 [ 754.601540] simple_read_from_buffer+0xcc/0x160 [ 754.602970] proc_fail_nth_read+0x198/0x230 [ 754.604460] ? proc_sessionid_read+0x230/0x230 [ 754.606076] ? security_file_permission+0xb1/0xe0 [ 754.607358] ? proc_sessionid_read+0x230/0x230 [ 754.608558] vfs_read+0x228/0x620 [ 754.609492] ksys_read+0x12d/0x260 [ 754.610169] FAULT_INJECTION: forcing a failure. [ 754.610169] name failslab, interval 1, probability 0, space 0, times 0 [ 754.610393] ? vfs_write+0xb10/0xb10 [ 754.613700] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 754.615072] ? syscall_enter_from_user_mode+0x1d/0x50 [ 754.616435] do_syscall_64+0x33/0x40 [ 754.617399] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 754.618735] RIP: 0033:0x7ff27c08069c [ 754.619861] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 754.624709] RSP: 002b:00007ff279643170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 754.626638] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007ff27c08069c [ 754.628452] RDX: 000000000000000f RSI: 00007ff2796431e0 RDI: 0000000000000003 [ 754.630286] RBP: 00007ff2796431d0 R08: 0000000000000000 R09: 0000000000000000 [ 754.632117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 754.633647] R13: 00007ffe2ad57a7f R14: 00007ff279643300 R15: 0000000000022000 [ 754.635176] CPU: 0 PID: 6499 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 754.637088] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 754.639339] Call Trace: [ 754.640088] dump_stack+0x107/0x167 [ 754.641081] should_fail.cold+0x5/0xa [ 754.642125] ? jbd2__journal_start+0x190/0x7e0 [ 754.643370] should_failslab+0x5/0x20 [ 754.644381] kmem_cache_alloc+0x5b/0x310 [ 754.645265] jbd2__journal_start+0x190/0x7e0 [ 754.646228] __ext4_journal_start_sb+0x214/0x390 [ 754.647382] __ext4_new_inode+0x2e0b/0x5370 [ 754.648436] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 754.649445] ? do_raw_spin_lock+0x121/0x260 [ 754.650368] ? dquot_initialize_needed+0x290/0x290 [ 754.651394] ? do_raw_spin_unlock+0x4f/0x220 [ 754.652333] ? d_splice_alias+0x4d0/0xc60 [ 754.653204] ext4_create+0x2ce/0x4d0 [ 754.654000] ? ext4_mknod+0x4e0/0x4e0 [ 754.654806] ? ext4_mknod+0x4e0/0x4e0 [ 754.655617] lookup_open.isra.0+0xea8/0x1270 [ 754.656543] ? vfs_tmpfile+0x350/0x350 [ 754.657399] path_openat+0x972/0x2770 [ 754.658212] ? path_lookupat+0x860/0x860 [ 754.659071] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 754.660181] ? lock_acquire+0x197/0x470 [ 754.661019] ? find_held_lock+0x2c/0x110 [ 754.661885] do_filp_open+0x190/0x3e0 [ 754.662685] ? may_open_dev+0xf0/0xf0 [ 754.663504] ? do_raw_spin_lock+0x121/0x260 [ 754.664416] ? rwlock_bug.part.0+0x90/0x90 [ 754.665310] ? _raw_spin_unlock+0x1a/0x30 [ 754.666182] ? alloc_fd+0x2e7/0x670 [ 754.666958] do_sys_openat2+0x171/0x4d0 [ 754.667807] ? build_open_flags+0x6f0/0x6f0 [ 754.668709] ? wait_for_completion_io+0x270/0x270 [ 754.669731] ? rcu_read_lock_any_held+0x75/0xa0 [ 754.670706] ? vfs_write+0x354/0xb10 [ 754.671503] __x64_sys_creat+0xc9/0x120 [ 754.672337] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 754.673386] ? __ia32_sys_read+0xb0/0xb0 [ 754.674241] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 754.675352] ? syscall_enter_from_user_mode+0x1d/0x50 [ 754.676466] ? trace_hardirqs_on+0x5b/0x180 [ 754.677397] do_syscall_64+0x33/0x40 [ 754.678184] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 754.679263] RIP: 0033:0x7fcf914ffb19 [ 754.680053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 754.683936] RSP: 002b:00007fcf8ea75188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 754.685536] RAX: ffffffffffffffda RBX: 00007fcf91612f60 RCX: 00007fcf914ffb19 [ 754.687024] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 754.688530] RBP: 00007fcf8ea751d0 R08: 0000000000000000 R09: 0000000000000000 [ 754.690025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 754.691526] R13: 00007ffd78c3ee2f R14: 00007fcf8ea75300 R15: 0000000000022000 [ 754.694000] EXT4-fs error (device sda) in __ext4_new_inode:1086: Out of memory [ 754.714397] FAULT_INJECTION: forcing a failure. [ 754.714397] name failslab, interval 1, probability 0, space 0, times 0 [ 754.717086] CPU: 1 PID: 6500 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 754.718562] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 754.720362] Call Trace: [ 754.720946] dump_stack+0x107/0x167 [ 754.721721] should_fail.cold+0x5/0xa [ 754.722624] ? create_object.isra.0+0x3a/0xa20 [ 754.723626] should_failslab+0x5/0x20 [ 754.724455] kmem_cache_alloc+0x5b/0x310 [ 754.725345] create_object.isra.0+0x3a/0xa20 [ 754.726298] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 754.727376] kmem_cache_alloc+0x159/0x310 [ 754.728273] jbd2_journal_add_journal_head+0x1a3/0x540 [ 754.729392] jbd2_journal_get_write_access+0x116/0x190 [ 754.730501] __ext4_journal_get_write_access+0x1a9/0x2c0 [ 754.731677] ext4_orphan_add+0x21c/0x9e0 [ 754.732550] ? ext4_empty_dir+0xae0/0xae0 [ 754.733427] ? jbd2__journal_start+0xf3/0x7e0 [ 754.734386] ? __ext4_journal_start_sb+0x214/0x390 [ 754.735425] ? __ext4_journal_start_sb+0x1db/0x390 [ 754.736479] ext4_truncate+0x724/0x1160 [ 754.737328] ? unmap_mapping_pages+0x117/0x2a0 [ 754.738315] ? ext4_punch_hole+0x1070/0x1070 [ 754.739253] ext4_setattr+0x1659/0x20f0 [ 754.740112] ? igrab+0xc0/0xc0 [ 754.740813] ? ext4_journalled_write_end+0x1190/0x1190 [ 754.741926] notify_change+0xc28/0x1160 [ 754.742776] ? cap_bprm_creds_from_file+0x17a0/0x27c0 [ 754.743897] do_truncate+0x134/0x1f0 [ 754.744690] ? file_open_root+0x440/0x440 [ 754.745591] ? may_open+0x1e4/0x400 [ 754.746370] path_openat+0x1dcd/0x2770 [ 754.747215] ? path_lookupat+0x860/0x860 [ 754.748109] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 754.749222] ? lock_acquire+0x197/0x470 [ 754.750071] ? find_held_lock+0x2c/0x110 [ 754.750952] do_filp_open+0x190/0x3e0 [ 754.751774] ? may_open_dev+0xf0/0xf0 [ 754.752602] ? do_raw_spin_lock+0x121/0x260 [ 754.753521] ? rwlock_bug.part.0+0x90/0x90 [ 754.754437] ? _raw_spin_unlock+0x1a/0x30 [ 754.755318] ? alloc_fd+0x2e7/0x670 [ 754.756119] do_sys_openat2+0x171/0x4d0 [ 754.756977] ? build_open_flags+0x6f0/0x6f0 [ 754.757901] ? wait_for_completion_io+0x270/0x270 [ 754.758940] ? rcu_read_lock_any_held+0x75/0xa0 [ 754.759948] ? vfs_write+0x354/0xb10 [ 754.760750] __x64_sys_creat+0xc9/0x120 [ 754.761601] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 754.762669] ? __ia32_sys_read+0xb0/0xb0 [ 754.763556] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 754.764676] ? syscall_enter_from_user_mode+0x1d/0x50 [ 754.765772] ? trace_hardirqs_on+0x5b/0x180 [ 754.766683] do_syscall_64+0x33/0x40 [ 754.767478] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 754.768572] RIP: 0033:0x7fdebd7f1b19 [ 754.769365] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 754.773252] RSP: 002b:00007fdebad46188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 754.774866] RAX: ffffffffffffffda RBX: 00007fdebd905020 RCX: 00007fdebd7f1b19 [ 754.776388] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 754.777889] RBP: 00007fdebad461d0 R08: 0000000000000000 R09: 0000000000000000 [ 754.779395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 754.780927] R13: 00007ffce3c54b0f R14: 00007fdebad46300 R15: 0000000000022000 19:01:03 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) [ 754.814442] FAULT_INJECTION: forcing a failure. [ 754.814442] name failslab, interval 1, probability 0, space 0, times 0 [ 754.816872] CPU: 0 PID: 6511 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 754.818315] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 754.820069] Call Trace: [ 754.820632] dump_stack+0x107/0x167 [ 754.821400] should_fail.cold+0x5/0xa [ 754.822204] ? getname_flags.part.0+0x50/0x4f0 19:01:03 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) (fail_nth: 15) [ 754.823168] should_failslab+0x5/0x20 [ 754.824182] kmem_cache_alloc+0x5b/0x310 [ 754.825045] ? ksys_write+0x12d/0x260 [ 754.825854] getname_flags.part.0+0x50/0x4f0 [ 754.826797] ? __mutex_unlock_slowpath+0xe1/0x600 [ 754.827828] user_path_at_empty+0xa1/0x100 [ 754.828733] path_setxattr+0x95/0x190 [ 754.829546] ? setxattr+0x330/0x330 [ 754.830317] ? ksys_write+0x1a9/0x260 [ 754.831129] ? __ia32_sys_read+0xb0/0xb0 [ 754.832015] __x64_sys_setxattr+0xc0/0x160 [ 754.832916] ? syscall_enter_from_user_mode+0x1d/0x50 [ 754.834006] do_syscall_64+0x33/0x40 [ 754.834794] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 754.835886] RIP: 0033:0x7fc989863b19 [ 754.836673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 754.840578] RSP: 002b:00007fc986db8188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 754.842192] RAX: ffffffffffffffda RBX: 00007fc989977020 RCX: 00007fc989863b19 [ 754.843718] RDX: 0000000020000200 RSI: 0000000020000140 RDI: 0000000020000100 [ 754.845229] RBP: 00007fc986db81d0 R08: 0000000000000000 R09: 0000000000000000 [ 754.846742] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000001 [ 754.848260] R13: 00007fffa31031ff R14: 00007fc986db8300 R15: 0000000000022000 19:01:03 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r2 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:01:03 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 2) 19:01:03 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000002000000483600000000000200"/32], 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r1, 0x409, 0xe) fallocate(r1, 0x0, 0x0, 0x4) dup3(r0, r1, 0x80000) 19:01:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, 0x0, 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 754.999787] FAULT_INJECTION: forcing a failure. [ 754.999787] name failslab, interval 1, probability 0, space 0, times 0 [ 755.002262] CPU: 1 PID: 6518 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 755.004013] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 755.006229] Call Trace: [ 755.006847] dump_stack+0x107/0x167 [ 755.007660] should_fail.cold+0x5/0xa [ 755.008515] ? create_object.isra.0+0x3a/0xa20 [ 755.009497] should_failslab+0x5/0x20 [ 755.010317] kmem_cache_alloc+0x5b/0x310 [ 755.011209] create_object.isra.0+0x3a/0xa20 [ 755.012172] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 755.013264] kmem_cache_alloc+0x159/0x310 [ 755.014175] jbd2__journal_start+0x190/0x7e0 [ 755.015137] __ext4_journal_start_sb+0x214/0x390 [ 755.016187] __ext4_new_inode+0x2e0b/0x5370 [ 755.017139] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 755.018173] ? do_raw_spin_lock+0x121/0x260 [ 755.019119] ? dquot_initialize_needed+0x290/0x290 [ 755.020188] ? do_raw_spin_unlock+0x4f/0x220 [ 755.021137] ? d_splice_alias+0x4d0/0xc60 [ 755.022038] ext4_create+0x2ce/0x4d0 [ 755.022852] ? ext4_mknod+0x4e0/0x4e0 [ 755.023707] ? ext4_mknod+0x4e0/0x4e0 [ 755.024529] lookup_open.isra.0+0xea8/0x1270 [ 755.025515] ? vfs_tmpfile+0x350/0x350 [ 755.026401] path_openat+0x972/0x2770 [ 755.027244] ? path_lookupat+0x860/0x860 [ 755.028170] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 755.029305] ? lock_acquire+0x197/0x470 [ 755.030171] ? find_held_lock+0x2c/0x110 [ 755.031075] do_filp_open+0x190/0x3e0 [ 755.031930] ? may_open_dev+0xf0/0xf0 [ 755.032757] ? do_raw_spin_lock+0x121/0x260 [ 755.033707] ? rwlock_bug.part.0+0x90/0x90 [ 755.034641] ? _raw_spin_unlock+0x1a/0x30 [ 755.035563] ? alloc_fd+0x2e7/0x670 [ 755.036385] do_sys_openat2+0x171/0x4d0 [ 755.037254] ? build_open_flags+0x6f0/0x6f0 [ 755.038192] ? wait_for_completion_io+0x270/0x270 [ 755.039265] ? rcu_read_lock_any_held+0x75/0xa0 [ 755.040310] ? vfs_write+0x354/0xb10 [ 755.041127] __x64_sys_creat+0xc9/0x120 [ 755.042009] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 755.043133] ? __ia32_sys_read+0xb0/0xb0 [ 755.044038] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 755.045182] ? syscall_enter_from_user_mode+0x1d/0x50 [ 755.046309] ? trace_hardirqs_on+0x5b/0x180 [ 755.047255] do_syscall_64+0x33/0x40 [ 755.048089] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 755.049200] RIP: 0033:0x7fcf914ffb19 [ 755.050009] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 755.054020] RSP: 002b:00007fcf8ea75188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 755.055691] RAX: ffffffffffffffda RBX: 00007fcf91612f60 RCX: 00007fcf914ffb19 [ 755.057248] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 755.058791] RBP: 00007fcf8ea751d0 R08: 0000000000000000 R09: 0000000000000000 [ 755.060377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 755.061928] R13: 00007ffd78c3ee2f R14: 00007fcf8ea75300 R15: 0000000000022000 19:01:03 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) (fail_nth: 12) 19:01:03 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000002000000483600000000000200"/32], 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r1, 0x409, 0xe) fallocate(r1, 0x0, 0x0, 0x4) dup3(r0, r1, 0x80000) 19:01:03 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) (fail_nth: 16) 19:01:03 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x2) [ 755.219078] FAULT_INJECTION: forcing a failure. [ 755.219078] name failslab, interval 1, probability 0, space 0, times 0 [ 755.221870] CPU: 1 PID: 6525 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 755.223714] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 755.225533] Call Trace: [ 755.226119] dump_stack+0x107/0x167 [ 755.227039] should_fail.cold+0x5/0xa [ 755.228074] ? create_object.isra.0+0x3a/0xa20 [ 755.229248] should_failslab+0x5/0x20 [ 755.230275] kmem_cache_alloc+0x5b/0x310 [ 755.231347] create_object.isra.0+0x3a/0xa20 [ 755.232501] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 755.233826] kmem_cache_alloc+0x159/0x310 [ 755.234936] getname_flags.part.0+0x50/0x4f0 [ 755.236095] user_path_at_empty+0xa1/0x100 [ 755.237182] path_setxattr+0x95/0x190 [ 755.238160] ? setxattr+0x330/0x330 [ 755.239113] ? ksys_write+0x1a9/0x260 [ 755.240134] ? __ia32_sys_read+0xb0/0xb0 [ 755.241190] __x64_sys_setxattr+0xc0/0x160 [ 755.242291] ? syscall_enter_from_user_mode+0x1d/0x50 [ 755.243637] do_syscall_64+0x33/0x40 [ 755.244599] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 755.245958] RIP: 0033:0x7fc989863b19 [ 755.247067] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 755.251869] RSP: 002b:00007fc986dd9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 755.254092] RAX: ffffffffffffffda RBX: 00007fc989976f60 RCX: 00007fc989863b19 [ 755.256254] RDX: 0000000020000200 RSI: 0000000020000140 RDI: 0000000020000100 [ 755.258392] RBP: 00007fc986dd91d0 R08: 0000000000000000 R09: 0000000000000000 [ 755.260412] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000001 [ 755.262640] R13: 00007fffa31031ff R14: 00007fc986dd9300 R15: 0000000000022000 [ 755.318489] FAULT_INJECTION: forcing a failure. [ 755.318489] name failslab, interval 1, probability 0, space 0, times 0 [ 755.321460] CPU: 1 PID: 6532 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 755.323179] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 755.325256] Call Trace: [ 755.325944] dump_stack+0x107/0x167 [ 755.326886] should_fail.cold+0x5/0xa [ 755.327868] ? create_object.isra.0+0x3a/0xa20 [ 755.329034] should_failslab+0x5/0x20 [ 755.329995] kmem_cache_alloc+0x5b/0x310 [ 755.331032] create_object.isra.0+0x3a/0xa20 [ 755.332151] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 755.333443] kmem_cache_alloc+0x159/0x310 [ 755.334471] ? lock_downgrade+0x6d0/0x6d0 [ 755.335528] jbd2__journal_start+0x190/0x7e0 [ 755.336620] __ext4_journal_start_sb+0x214/0x390 [ 755.337809] ext4_dirty_inode+0xbc/0x130 [ 755.338806] ? ext4_setattr+0x20f0/0x20f0 [ 755.339843] __mark_inode_dirty+0x492/0xd40 [ 755.340908] ext4_setattr+0x123f/0x20f0 [ 755.341902] ? igrab+0xc0/0xc0 [ 755.342705] ? ext4_journalled_write_end+0x1190/0x1190 [ 755.344014] notify_change+0xc28/0x1160 [ 755.345000] ? cap_bprm_creds_from_file+0x17a0/0x27c0 [ 755.346288] do_truncate+0x134/0x1f0 [ 755.347210] ? file_open_root+0x440/0x440 [ 755.348269] ? may_open+0x1e4/0x400 [ 755.349166] path_openat+0x1dcd/0x2770 [ 755.350149] ? path_lookupat+0x860/0x860 [ 755.351167] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 755.352463] ? lock_acquire+0x197/0x470 [ 755.353438] ? find_held_lock+0x2c/0x110 [ 755.354465] do_filp_open+0x190/0x3e0 [ 755.355413] ? may_open_dev+0xf0/0xf0 [ 755.356386] ? do_raw_spin_lock+0x121/0x260 [ 755.357457] ? rwlock_bug.part.0+0x90/0x90 [ 755.358529] ? _raw_spin_unlock+0x1a/0x30 [ 755.359569] ? alloc_fd+0x2e7/0x670 [ 755.360495] do_sys_openat2+0x171/0x4d0 [ 755.361486] ? build_open_flags+0x6f0/0x6f0 [ 755.362568] ? wait_for_completion_io+0x270/0x270 [ 755.363786] ? rcu_read_lock_any_held+0x75/0xa0 [ 755.364942] ? vfs_write+0x354/0xb10 [ 755.365873] __x64_sys_creat+0xc9/0x120 [ 755.366868] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 755.368112] ? __ia32_sys_read+0xb0/0xb0 [ 755.369116] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 755.370383] ? syscall_enter_from_user_mode+0x1d/0x50 [ 755.371653] ? trace_hardirqs_on+0x5b/0x180 [ 755.372701] do_syscall_64+0x33/0x40 [ 755.373613] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 755.374863] RIP: 0033:0x7fdebd7f1b19 [ 755.375779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 755.380247] RSP: 002b:00007fdebad67188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 755.382092] RAX: ffffffffffffffda RBX: 00007fdebd904f60 RCX: 00007fdebd7f1b19 [ 755.383829] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 755.385562] RBP: 00007fdebad671d0 R08: 0000000000000000 R09: 0000000000000000 [ 755.387279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 755.389011] R13: 00007ffce3c54b0f R14: 00007fdebad67300 R15: 0000000000022000 [ 755.465349] FAULT_INJECTION: forcing a failure. [ 755.465349] name failslab, interval 1, probability 0, space 0, times 0 [ 755.468172] CPU: 1 PID: 6537 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 755.469796] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 755.471803] Call Trace: [ 755.472447] dump_stack+0x107/0x167 [ 755.473329] should_fail.cold+0x5/0xa [ 755.474252] should_failslab+0x5/0x20 [ 755.475199] __kmalloc_track_caller+0x79/0x370 [ 755.476312] ? sidtab_sid2str_get+0x17e/0x720 [ 755.477393] kmemdup+0x23/0x50 [ 755.478169] sidtab_sid2str_get+0x17e/0x720 [ 755.479213] sidtab_entry_to_string+0x33/0x110 [ 755.480340] security_sid_to_context_core+0x33c/0x5d0 [ 755.481577] selinux_inode_init_security+0x4ab/0x690 [ 755.482795] ? selinux_dentry_init_security+0x280/0x280 [ 755.484103] ? get_cached_acl_rcu+0x120/0x120 [ 755.485197] ? find_held_lock+0x2c/0x110 [ 755.486192] security_inode_init_security+0x151/0x360 [ 755.487440] ? ext4_init_acl+0x310/0x310 [ 755.488431] ? inode_free_by_rcu+0x20/0x20 [ 755.489468] ? chksum_update+0x4c/0xb0 [ 755.490424] __ext4_new_inode+0x386e/0x5370 [ 755.491501] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 755.492653] ? do_raw_spin_lock+0x121/0x260 [ 755.493679] ? dquot_initialize_needed+0x290/0x290 [ 755.494840] ? do_raw_spin_unlock+0x4f/0x220 [ 755.495924] ? d_splice_alias+0x4d0/0xc60 [ 755.496914] ext4_create+0x2ce/0x4d0 [ 755.497793] ? ext4_mknod+0x4e0/0x4e0 [ 755.498713] ? ext4_mknod+0x4e0/0x4e0 [ 755.499684] lookup_open.isra.0+0xea8/0x1270 [ 755.500753] ? vfs_tmpfile+0x350/0x350 [ 755.501733] path_openat+0x972/0x2770 [ 755.502659] ? path_lookupat+0x860/0x860 [ 755.503643] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 755.504894] ? lock_acquire+0x197/0x470 [ 755.505833] ? find_held_lock+0x2c/0x110 [ 755.506818] do_filp_open+0x190/0x3e0 [ 755.507740] ? may_open_dev+0xf0/0xf0 [ 755.508648] ? do_raw_spin_lock+0x121/0x260 [ 755.509668] ? rwlock_bug.part.0+0x90/0x90 [ 755.510686] ? _raw_spin_unlock+0x1a/0x30 [ 755.511689] ? alloc_fd+0x2e7/0x670 [ 755.512569] do_sys_openat2+0x171/0x4d0 [ 755.513509] ? build_open_flags+0x6f0/0x6f0 [ 755.514519] ? wait_for_completion_io+0x270/0x270 [ 755.515822] ? rcu_read_lock_any_held+0x75/0xa0 [ 755.517156] ? vfs_write+0x354/0xb10 [ 755.518250] __x64_sys_creat+0xc9/0x120 [ 755.519294] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 755.520488] ? __ia32_sys_read+0xb0/0xb0 [ 755.521503] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 755.522725] ? syscall_enter_from_user_mode+0x1d/0x50 [ 755.523995] ? trace_hardirqs_on+0x5b/0x180 [ 755.525053] do_syscall_64+0x33/0x40 [ 755.525960] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 755.527200] RIP: 0033:0x7fcf914ffb19 [ 755.528114] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 755.532558] RSP: 002b:00007fcf8ea75188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 755.534490] RAX: ffffffffffffffda RBX: 00007fcf91612f60 RCX: 00007fcf914ffb19 [ 755.536221] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 755.537936] RBP: 00007fcf8ea751d0 R08: 0000000000000000 R09: 0000000000000000 [ 755.539659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 755.541358] R13: 00007ffd78c3ee2f R14: 00007fcf8ea75300 R15: 0000000000022000 19:01:20 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r2 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:01:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, 0x0, 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 19:01:20 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x3) 19:01:20 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) (fail_nth: 17) 19:01:20 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 3) 19:01:20 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) (fail_nth: 13) 19:01:20 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000002000000483600000000000200"/32], 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r1, 0x409, 0xe) fallocate(r1, 0x0, 0x0, 0x4) dup3(r0, r1, 0x80000) 19:01:20 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000002000000483600000000000200"/32], 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r1, 0x409, 0xe) fallocate(r1, 0x0, 0x0, 0x4) dup3(r0, r1, 0x80000) [ 771.814950] FAULT_INJECTION: forcing a failure. [ 771.814950] name failslab, interval 1, probability 0, space 0, times 0 [ 771.817794] CPU: 1 PID: 6554 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 771.819231] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 771.821004] Call Trace: [ 771.821567] dump_stack+0x107/0x167 [ 771.822338] should_fail.cold+0x5/0xa [ 771.823143] ? create_object.isra.0+0x3a/0xa20 [ 771.824141] should_failslab+0x5/0x20 [ 771.824950] kmem_cache_alloc+0x5b/0x310 [ 771.825814] ? sidtab_sid2str_get+0x65/0x720 [ 771.826747] create_object.isra.0+0x3a/0xa20 [ 771.827702] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 771.828799] __kmalloc_track_caller+0x177/0x370 [ 771.829787] ? sidtab_sid2str_get+0x17e/0x720 [ 771.830746] kmemdup+0x23/0x50 [ 771.831430] sidtab_sid2str_get+0x17e/0x720 [ 771.832375] sidtab_entry_to_string+0x33/0x110 [ 771.833353] security_sid_to_context_core+0x33c/0x5d0 [ 771.834457] selinux_inode_init_security+0x4ab/0x690 [ 771.835542] ? selinux_dentry_init_security+0x280/0x280 [ 771.836687] ? get_cached_acl_rcu+0x120/0x120 [ 771.837645] ? find_held_lock+0x2c/0x110 [ 771.838527] security_inode_init_security+0x151/0x360 [ 771.839617] ? ext4_init_acl+0x310/0x310 [ 771.840512] ? inode_free_by_rcu+0x20/0x20 [ 771.841438] ? chksum_update+0x4c/0xb0 [ 771.842279] __ext4_new_inode+0x386e/0x5370 [ 771.843227] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 771.844288] ? do_raw_spin_lock+0x121/0x260 [ 771.845215] ? dquot_initialize_needed+0x290/0x290 [ 771.846258] ? do_raw_spin_unlock+0x4f/0x220 [ 771.847194] ? d_splice_alias+0x4d0/0xc60 [ 771.848121] ext4_create+0x2ce/0x4d0 [ 771.848922] ? ext4_mknod+0x4e0/0x4e0 [ 771.849746] ? ext4_mknod+0x4e0/0x4e0 [ 771.850558] lookup_open.isra.0+0xea8/0x1270 [ 771.851505] ? vfs_tmpfile+0x350/0x350 [ 771.852399] path_openat+0x972/0x2770 [ 771.853216] ? path_lookupat+0x860/0x860 [ 771.854083] ? perf_trace_lock+0xac/0x490 [ 771.854958] ? lock_acquire+0x197/0x470 [ 771.855831] ? find_held_lock+0x2c/0x110 [ 771.856689] ? __lockdep_reset_lock+0x180/0x180 [ 771.857686] do_filp_open+0x190/0x3e0 [ 771.858487] ? may_open_dev+0xf0/0xf0 [ 771.859307] ? do_raw_spin_lock+0x121/0x260 [ 771.860253] ? rwlock_bug.part.0+0x90/0x90 [ 771.861160] ? _raw_spin_unlock+0x1a/0x30 [ 771.862036] ? alloc_fd+0x2e7/0x670 [ 771.862829] do_sys_openat2+0x171/0x4d0 [ 771.863676] ? build_open_flags+0x6f0/0x6f0 [ 771.864604] ? wait_for_completion_io+0x270/0x270 [ 771.865630] ? rcu_read_lock_any_held+0x75/0xa0 [ 771.866621] ? vfs_write+0x354/0xb10 [ 771.867421] __x64_sys_creat+0xc9/0x120 [ 771.868285] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 771.869340] ? __ia32_sys_read+0xb0/0xb0 [ 771.870203] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 771.871318] ? syscall_enter_from_user_mode+0x1d/0x50 [ 771.872430] ? trace_hardirqs_on+0x5b/0x180 [ 771.873352] do_syscall_64+0x33/0x40 [ 771.874139] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 771.875229] RIP: 0033:0x7fcf914ffb19 [ 771.876039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 771.879966] RSP: 002b:00007fcf8ea75188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 771.881565] RAX: ffffffffffffffda RBX: 00007fcf91612f60 RCX: 00007fcf914ffb19 [ 771.883092] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 771.884647] RBP: 00007fcf8ea751d0 R08: 0000000000000000 R09: 0000000000000000 [ 771.886167] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 771.887698] R13: 00007ffd78c3ee2f R14: 00007fcf8ea75300 R15: 0000000000022000 [ 771.893450] FAULT_INJECTION: forcing a failure. [ 771.893450] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 771.897284] CPU: 0 PID: 6550 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 771.898881] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 771.900856] Call Trace: [ 771.901485] dump_stack+0x107/0x167 [ 771.902351] should_fail.cold+0x5/0xa [ 771.903264] strncpy_from_user+0x34/0x470 [ 771.904240] getname_flags.part.0+0x95/0x4f0 [ 771.905272] ? __mutex_unlock_slowpath+0xe1/0x600 [ 771.906413] user_path_at_empty+0xa1/0x100 [ 771.907428] path_setxattr+0x95/0x190 [ 771.908330] ? setxattr+0x330/0x330 [ 771.909192] ? ksys_write+0x1a9/0x260 [ 771.910088] ? __ia32_sys_read+0xb0/0xb0 [ 771.911058] __x64_sys_setxattr+0xc0/0x160 [ 771.912067] ? syscall_enter_from_user_mode+0x1d/0x50 [ 771.913278] do_syscall_64+0x33/0x40 [ 771.914156] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 771.915361] RIP: 0033:0x7fc989863b19 [ 771.916220] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 771.920535] RSP: 002b:00007fc986dd9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 771.922315] RAX: ffffffffffffffda RBX: 00007fc989976f60 RCX: 00007fc989863b19 [ 771.923989] RDX: 0000000020000200 RSI: 0000000020000140 RDI: 0000000020000100 [ 771.925756] RBP: 00007fc986dd91d0 R08: 0000000000000000 R09: 0000000000000000 [ 771.927405] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000001 [ 771.929036] R13: 00007fffa31031ff R14: 00007fc986dd9300 R15: 0000000000022000 19:01:20 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000002000000483600000000000200"/32], 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r1, 0x409, 0xe) fallocate(r1, 0x0, 0x0, 0x4) dup3(r0, r1, 0x80000) 19:01:20 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 4) [ 772.057222] FAULT_INJECTION: forcing a failure. [ 772.057222] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 772.059874] CPU: 0 PID: 6561 Comm: syz-executor.1 Not tainted 5.10.240 #1 [ 772.061409] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 772.063275] Call Trace: [ 772.063879] dump_stack+0x107/0x167 [ 772.064702] should_fail.cold+0x5/0xa [ 772.065690] _copy_to_user+0x2e/0x180 [ 772.066563] simple_read_from_buffer+0xcc/0x160 [ 772.067613] proc_fail_nth_read+0x198/0x230 [ 772.068598] ? proc_sessionid_read+0x230/0x230 [ 772.069627] ? security_file_permission+0xb1/0xe0 19:01:20 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x4) [ 772.070718] ? proc_sessionid_read+0x230/0x230 [ 772.071880] vfs_read+0x228/0x620 [ 772.072667] ksys_read+0x12d/0x260 [ 772.073468] ? vfs_write+0xb10/0xb10 [ 772.074312] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 772.075482] ? syscall_enter_from_user_mode+0x1d/0x50 [ 772.076648] do_syscall_64+0x33/0x40 [ 772.077486] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 772.078637] RIP: 0033:0x7fdebd7a469c [ 772.079474] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 19:01:20 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) write$P9_RREADLINK(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="100200001702000700ffff66696c7831b0e73f6e5ed46d083c699296ccdfcde3ecc0640b6a8d038ded0f904b55aec8cd5960b5ac9dff94e95ceca3b126e08a4beeb315ca39cd1135"], 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fdinfo\x00') syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000300)=ANY=[@ANYBLOB="0100000001f9ff0018000000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1/file0\x00']) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000080), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00000001c0), &(0x7f0000000140)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000000)='./file1/file0\x00', 0x21) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@cache_loose}, {@cache_none}]}}) [ 772.083619] RSP: 002b:00007fdebad67170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 772.085421] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007fdebd7a469c [ 772.087023] RDX: 000000000000000f RSI: 00007fdebad671e0 RDI: 0000000000000004 [ 772.088638] RBP: 00007fdebad671d0 R08: 0000000000000000 R09: 0000000000000000 [ 772.090237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 772.091852] R13: 00007ffce3c54b0f R14: 00007fdebad67300 R15: 0000000000022000 19:01:20 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) (fail_nth: 18) 19:01:20 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r2 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:01:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, 0x0, 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 19:01:20 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 772.308893] FAULT_INJECTION: forcing a failure. [ 772.308893] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 772.312027] CPU: 0 PID: 6570 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 772.313672] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 772.315552] Call Trace: [ 772.316170] dump_stack+0x107/0x167 [ 772.317016] should_fail.cold+0x5/0xa [ 772.317903] strncpy_from_user+0x34/0x470 [ 772.318862] setxattr+0xc8/0x330 [ 772.319639] ? vfs_setxattr+0x270/0x270 [ 772.320556] ? filename_lookup+0x3c8/0x570 [ 772.321522] ? may_linkat+0x230/0x230 [ 772.322402] ? lock_acquire+0x197/0x470 [ 772.323308] ? path_setxattr+0xb5/0x190 [ 772.324238] ? lock_release+0x680/0x680 [ 772.325149] ? strncpy_from_user+0x9e/0x470 [ 772.326151] ? __mnt_want_write+0x196/0x280 [ 772.327153] path_setxattr+0x174/0x190 [ 772.328048] ? setxattr+0x330/0x330 [ 772.328885] ? __ia32_sys_read+0xb0/0xb0 [ 772.329827] __x64_sys_setxattr+0xc0/0x160 [ 772.330792] ? syscall_enter_from_user_mode+0x1d/0x50 [ 772.331971] do_syscall_64+0x33/0x40 [ 772.332817] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 772.333987] RIP: 0033:0x7fc989863b19 [ 772.334831] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 772.339001] RSP: 002b:00007fc986dd9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 772.340736] RAX: ffffffffffffffda RBX: 00007fc989976f60 RCX: 00007fc989863b19 [ 772.342372] RDX: 0000000020000200 RSI: 0000000020000140 RDI: 0000000020000100 [ 772.343996] RBP: 00007fc986dd91d0 R08: 0000000000000000 R09: 0000000000000000 [ 772.345619] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000001 [ 772.347242] R13: 00007fffa31031ff R14: 00007fc986dd9300 R15: 0000000000022000 [ 772.369471] FAULT_INJECTION: forcing a failure. [ 772.369471] name failslab, interval 1, probability 0, space 0, times 0 [ 772.372079] CPU: 0 PID: 6576 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 772.373636] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 772.375509] Call Trace: [ 772.376126] dump_stack+0x107/0x167 [ 772.376953] should_fail.cold+0x5/0xa [ 772.377818] ? create_object.isra.0+0x3a/0xa20 [ 772.378845] should_failslab+0x5/0x20 [ 772.379713] kmem_cache_alloc+0x5b/0x310 [ 772.380640] create_object.isra.0+0x3a/0xa20 [ 772.381639] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 772.382798] __kmalloc_track_caller+0x177/0x370 [ 772.383861] ? sidtab_sid2str_get+0x17e/0x720 [ 772.384878] kmemdup+0x23/0x50 [ 772.385610] sidtab_sid2str_get+0x17e/0x720 [ 772.386595] sidtab_entry_to_string+0x33/0x110 [ 772.387633] security_sid_to_context_core+0x33c/0x5d0 [ 772.388823] selinux_inode_init_security+0x4ab/0x690 [ 772.389981] ? selinux_dentry_init_security+0x280/0x280 [ 772.391184] ? get_cached_acl_rcu+0x120/0x120 [ 772.392211] ? find_held_lock+0x2c/0x110 [ 772.393145] security_inode_init_security+0x151/0x360 [ 772.394311] ? ext4_init_acl+0x310/0x310 [ 772.395240] ? inode_free_by_rcu+0x20/0x20 [ 772.396309] ? chksum_update+0x4c/0xb0 [ 772.397206] __ext4_new_inode+0x386e/0x5370 [ 772.398219] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 772.399308] ? do_raw_spin_lock+0x121/0x260 [ 772.400301] ? dquot_initialize_needed+0x290/0x290 [ 772.401407] ? do_raw_spin_unlock+0x4f/0x220 [ 772.402401] ? d_splice_alias+0x4d0/0xc60 [ 772.403346] ext4_create+0x2ce/0x4d0 [ 772.404210] ? ext4_mknod+0x4e0/0x4e0 [ 772.405113] ? ext4_mknod+0x4e0/0x4e0 [ 772.405983] lookup_open.isra.0+0xea8/0x1270 [ 772.406989] ? vfs_tmpfile+0x350/0x350 [ 772.407925] path_openat+0x972/0x2770 [ 772.408804] ? path_lookupat+0x860/0x860 [ 772.409723] ? perf_trace_lock+0xac/0x490 [ 772.410658] ? lock_acquire+0x197/0x470 [ 772.411559] ? find_held_lock+0x2c/0x110 [ 772.412499] ? __lockdep_reset_lock+0x180/0x180 [ 772.413561] do_filp_open+0x190/0x3e0 [ 772.414421] ? may_open_dev+0xf0/0xf0 [ 772.415296] ? do_raw_spin_lock+0x121/0x260 [ 772.416279] ? rwlock_bug.part.0+0x90/0x90 [ 772.417251] ? _raw_spin_unlock+0x1a/0x30 [ 772.418190] ? alloc_fd+0x2e7/0x670 [ 772.419032] do_sys_openat2+0x171/0x4d0 [ 772.419943] ? build_open_flags+0x6f0/0x6f0 [ 772.420926] ? wait_for_completion_io+0x270/0x270 [ 772.422018] ? rcu_read_lock_any_held+0x75/0xa0 [ 772.423068] ? vfs_write+0x354/0xb10 [ 772.423924] __x64_sys_creat+0xc9/0x120 [ 772.424825] ? __ia32_compat_sys_openat+0x1f0/0x1f0 19:01:20 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x5) [ 772.425953] ? __ia32_sys_read+0xb0/0xb0 [ 772.427015] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 772.428239] ? syscall_enter_from_user_mode+0x1d/0x50 [ 772.429423] ? trace_hardirqs_on+0x5b/0x180 [ 772.430423] do_syscall_64+0x33/0x40 [ 772.431284] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 772.432473] RIP: 0033:0x7fcf914ffb19 [ 772.433326] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 772.437570] RSP: 002b:00007fcf8ea75188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 772.439331] RAX: ffffffffffffffda RBX: 00007fcf91612f60 RCX: 00007fcf914ffb19 [ 772.440975] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 772.442622] RBP: 00007fcf8ea751d0 R08: 0000000000000000 R09: 0000000000000000 [ 772.444295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 772.445935] R13: 00007ffd78c3ee2f R14: 00007fcf8ea75300 R15: 0000000000022000 19:01:34 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) (fail_nth: 19) 19:01:34 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x6) 19:01:34 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000002000000483600000000000200"/32], 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r1, 0x409, 0xe) dup3(r0, r1, 0x80000) 19:01:34 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r2 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:01:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x2) 19:01:34 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 19:01:34 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000010000001800000407b94b89c498474e311b3e0af5953256ab4a922c43b0cea68aa97561305c", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x18100, 0x40) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x5}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:01:34 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 5) [ 786.168801] FAULT_INJECTION: forcing a failure. [ 786.168801] name failslab, interval 1, probability 0, space 0, times 0 [ 786.171378] CPU: 1 PID: 6603 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 786.172881] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 786.174687] Call Trace: [ 786.175280] dump_stack+0x107/0x167 [ 786.176093] should_fail.cold+0x5/0xa [ 786.176935] ? kvmalloc_node+0x119/0x170 [ 786.177831] should_failslab+0x5/0x20 [ 786.178666] __kmalloc_node+0x76/0x420 [ 786.179540] kvmalloc_node+0x119/0x170 [ 786.180419] setxattr+0x14e/0x330 [ 786.181398] ? vfs_setxattr+0x270/0x270 [ 786.182283] ? filename_lookup+0x3c8/0x570 [ 786.183246] ? lock_acquire+0x197/0x470 [ 786.184320] ? path_setxattr+0xb5/0x190 [ 786.185206] ? lock_release+0x680/0x680 [ 786.186285] ? strncpy_from_user+0x9e/0x470 [ 786.187241] ? __mnt_want_write+0x196/0x280 [ 786.188413] path_setxattr+0x174/0x190 [ 786.189476] ? setxattr+0x330/0x330 [ 786.190467] ? __ia32_sys_read+0xb0/0xb0 [ 786.191571] __x64_sys_setxattr+0xc0/0x160 [ 786.192724] ? syscall_enter_from_user_mode+0x1d/0x50 [ 786.193869] do_syscall_64+0x33/0x40 [ 786.194864] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 786.196031] RIP: 0033:0x7fc989863b19 [ 786.197039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 786.201086] RSP: 002b:00007fc986dd9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 786.203166] RAX: ffffffffffffffda RBX: 00007fc989976f60 RCX: 00007fc989863b19 [ 786.204811] RDX: 0000000020000200 RSI: 0000000020000140 RDI: 0000000020000100 [ 786.206478] RBP: 00007fc986dd91d0 R08: 0000000000000000 R09: 0000000000000000 [ 786.208232] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000001 [ 786.209792] R13: 00007fffa31031ff R14: 00007fc986dd9300 R15: 0000000000022000 [ 786.211752] FAULT_INJECTION: forcing a failure. [ 786.211752] name failslab, interval 1, probability 0, space 0, times 0 [ 786.214318] CPU: 1 PID: 6607 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 786.215981] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 786.217788] Call Trace: [ 786.218370] dump_stack+0x107/0x167 [ 786.219381] should_fail.cold+0x5/0xa [ 786.220237] ? ext4_inode_attach_jinode+0x114/0x230 [ 786.221321] should_failslab+0x5/0x20 [ 786.222359] kmem_cache_alloc+0x5b/0x310 [ 786.223255] ext4_inode_attach_jinode+0x114/0x230 [ 786.224577] ext4_file_open+0x302/0xa50 [ 786.225451] ? ext4_file_write_iter+0x1530/0x1530 [ 786.226762] ? selinux_inode_create+0x30/0x30 [ 786.227744] ? lock_downgrade+0x6d0/0x6d0 [ 786.228880] ? do_raw_spin_lock+0x12c/0x260 [ 786.229845] ? fsnotify_perm.part.0+0x22d/0x620 [ 786.231180] do_dentry_open+0x4b7/0x1090 [ 786.232092] ? ext4_file_write_iter+0x1530/0x1530 [ 786.233527] ? may_open+0x1e4/0x400 [ 786.234438] path_openat+0x19ba/0x2770 [ 786.235604] ? path_lookupat+0x860/0x860 [ 786.236632] ? perf_trace_lock+0xac/0x490 [ 786.237803] ? lock_acquire+0x197/0x470 [ 786.238670] ? find_held_lock+0x2c/0x110 [ 786.239898] ? __lockdep_reset_lock+0x180/0x180 [ 786.241075] do_filp_open+0x190/0x3e0 [ 786.242262] ? may_open_dev+0xf0/0xf0 [ 786.243211] ? do_raw_spin_lock+0x121/0x260 [ 786.244558] ? rwlock_bug.part.0+0x90/0x90 [ 786.245563] ? _raw_spin_unlock+0x1a/0x30 [ 786.246802] ? alloc_fd+0x2e7/0x670 [ 786.247721] do_sys_openat2+0x171/0x4d0 [ 786.248956] ? build_open_flags+0x6f0/0x6f0 [ 786.250020] ? wait_for_completion_io+0x270/0x270 [ 786.251385] ? rcu_read_lock_any_held+0x75/0xa0 [ 786.252566] ? vfs_write+0x354/0xb10 [ 786.253517] __x64_sys_creat+0xc9/0x120 [ 786.254473] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 786.255636] ? __ia32_sys_read+0xb0/0xb0 [ 786.256625] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 786.257978] ? syscall_enter_from_user_mode+0x1d/0x50 [ 786.259235] ? trace_hardirqs_on+0x5b/0x180 [ 786.260374] do_syscall_64+0x33/0x40 [ 786.261258] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 786.262510] RIP: 0033:0x7fcf914ffb19 [ 786.263424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 786.267861] RSP: 002b:00007fcf8ea75188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 786.269589] RAX: ffffffffffffffda RBX: 00007fcf91612f60 RCX: 00007fcf914ffb19 [ 786.271408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 786.273037] RBP: 00007fcf8ea751d0 R08: 0000000000000000 R09: 0000000000000000 [ 786.274598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 786.276172] R13: 00007ffd78c3ee2f R14: 00007fcf8ea75300 R15: 0000000000022000 19:01:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x3) 19:01:34 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x7) 19:01:34 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000010000001800000407b94b89c498474e311b3e0af5953256ab4a922c43b0cea68aa97561305c", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x18100, 0x40) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) symlinkat(0x0, 0xffffffffffffffff, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x1, 0x5}, &(0x7f0000000000)=':\x15\x00U\x1bT;\xfa4\x8dd\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9[\xee|4P\xa7\xe8\xad\x82,\xf5\xd1\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\x8dk\xf2\xe4\x80\x9aJ\xe7\xdb\x8e\xd3\x80*i\x82CT\xb3j%\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x9cX', 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), 0xffffffffffffffff) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:01:34 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 19:01:34 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000002000000483600000000000200"/32], 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:01:34 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r2 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:01:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x4) 19:01:34 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) (fail_nth: 20) [ 786.677973] FAULT_INJECTION: forcing a failure. [ 786.677973] name failslab, interval 1, probability 0, space 0, times 0 [ 786.679738] CPU: 0 PID: 6633 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 786.680838] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 786.682185] Call Trace: [ 786.682612] dump_stack+0x107/0x167 [ 786.683241] should_fail.cold+0x5/0xa [ 786.683889] ? ext4_inode_attach_jinode+0x114/0x230 [ 786.684690] should_failslab+0x5/0x20 [ 786.685310] kmem_cache_alloc+0x5b/0x310 [ 786.685975] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 786.686797] ext4_inode_attach_jinode+0x114/0x230 [ 786.687569] ext4_file_open+0x302/0xa50 [ 786.688200] ? ext4_file_write_iter+0x1530/0x1530 [ 786.688993] ? selinux_inode_create+0x30/0x30 [ 786.689685] ? lock_downgrade+0x6d0/0x6d0 [ 786.690351] ? do_raw_spin_lock+0x12c/0x260 [ 786.691024] ? fsnotify_perm.part.0+0x22d/0x620 [ 786.691777] do_dentry_open+0x4b7/0x1090 [ 786.692413] ? ext4_file_write_iter+0x1530/0x1530 [ 786.693191] ? may_open+0x1e4/0x400 [ 786.693788] path_openat+0x19ba/0x2770 [ 786.694410] ? path_lookupat+0x860/0x860 [ 786.695065] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 786.695908] ? lock_acquire+0x197/0x470 [ 786.696531] ? find_held_lock+0x2c/0x110 [ 786.697200] do_filp_open+0x190/0x3e0 [ 786.697799] ? may_open_dev+0xf0/0xf0 [ 786.698399] ? do_raw_spin_lock+0x121/0x260 [ 786.699068] ? rwlock_bug.part.0+0x90/0x90 [ 786.699757] ? _raw_spin_unlock+0x1a/0x30 [ 786.700403] ? alloc_fd+0x2e7/0x670 [ 786.701002] do_sys_openat2+0x171/0x4d0 [ 786.701621] ? build_open_flags+0x6f0/0x6f0 [ 786.702314] ? wait_for_completion_io+0x270/0x270 [ 786.703065] ? rcu_read_lock_any_held+0x75/0xa0 [ 786.703813] ? vfs_write+0x354/0xb10 [ 786.704403] __x64_sys_creat+0xc9/0x120 [ 786.705034] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 786.705844] ? __ia32_sys_read+0xb0/0xb0 [ 786.706499] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 786.707337] ? syscall_enter_from_user_mode+0x1d/0x50 [ 786.708160] ? trace_hardirqs_on+0x5b/0x180 [ 786.708849] do_syscall_64+0x33/0x40 [ 786.709448] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 786.710268] RIP: 0033:0x7fcf914ffb19 [ 786.710864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 786.713822] RSP: 002b:00007fcf8ea75188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 786.715031] RAX: ffffffffffffffda RBX: 00007fcf91612f60 RCX: 00007fcf914ffb19 [ 786.716181] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 786.717317] RBP: 00007fcf8ea751d0 R08: 0000000000000000 R09: 0000000000000000 [ 786.718467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 786.719589] R13: 00007ffd78c3ee2f R14: 00007fcf8ea75300 R15: 0000000000022000 19:01:50 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 6) 19:01:50 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) (fail_nth: 21) 19:01:50 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 19:01:50 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r0) keyctl$revoke(0x3, 0x0) mincore(&(0x7f0000b1c000/0x3000)=nil, 0x3000, &(0x7f0000000300)=""/108) r1 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x10000) keyctl$get_security(0x11, r2, 0x0, 0x0) r3 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x66, 0x33, 0x36, 0x7, 0x63, 0x62, 0x61, 0x3d, 0x37, 0x33, 0x31, 0x35, 0x37, 0x35, 0x38, 0x39]}, &(0x7f0000000100)={0x0, "345cce8f8dd5e39b6b54a3b7f9211cef20b94b5e8f57adbb67e6d63d22c3e9573ac9f2889fd13accbeee09534bff45a39704a84d5ae56210d6358734a4857ed6", 0x14}, 0x48, r1) keyctl$link(0x8, r2, r3) 19:01:50 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x8) 19:01:50 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r2 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:01:50 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000002000000483600000000000200"/32], 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) 19:01:50 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x7) [ 801.867003] FAULT_INJECTION: forcing a failure. [ 801.867003] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 801.869896] CPU: 1 PID: 6649 Comm: syz-executor.0 Not tainted 5.10.240 #1 [ 801.871327] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 801.873075] Call Trace: [ 801.873630] dump_stack+0x107/0x167 [ 801.874404] should_fail.cold+0x5/0xa [ 801.875217] _copy_from_user+0x2e/0x1b0 [ 801.876289] kstrtouint_from_user+0xbd/0x220 [ 801.877368] ? kstrtou8_from_user+0x210/0x210 [ 801.878501] ? lock_acquire+0x197/0x470 [ 801.879345] ? ksys_write+0x12d/0x260 [ 801.880175] proc_fail_nth_write+0x78/0x220 [ 801.881081] ? proc_task_getattr+0x1f0/0x1f0 [ 801.882022] ? proc_task_getattr+0x1f0/0x1f0 [ 801.882947] vfs_write+0x29a/0xb10 [ 801.883705] ksys_write+0x12d/0x260 [ 801.884479] ? __ia32_sys_read+0xb0/0xb0 [ 801.885346] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 801.886457] ? syscall_enter_from_user_mode+0x1d/0x50 [ 801.887554] do_syscall_64+0x33/0x40 [ 801.888465] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 801.889634] RIP: 0033:0x7fcf914b25ff [ 801.890415] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 801.894643] RSP: 002b:00007fcf8ea75170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 801.896253] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fcf914b25ff [ 801.897755] RDX: 0000000000000001 RSI: 00007fcf8ea751e0 RDI: 0000000000000003 [ 801.899255] RBP: 00007fcf8ea751d0 R08: 0000000000000000 R09: 0000000000000000 [ 801.900778] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 801.902275] R13: 00007ffd78c3ee2f R14: 00007fcf8ea75300 R15: 0000000000022000 [ 801.909325] FAULT_INJECTION: forcing a failure. [ 801.909325] name failslab, interval 1, probability 0, space 0, times 0 [ 801.912181] CPU: 0 PID: 6648 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 801.913764] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 801.915686] Call Trace: [ 801.916333] dump_stack+0x107/0x167 [ 801.917202] should_fail.cold+0x5/0xa [ 801.918108] ? create_object.isra.0+0x3a/0xa20 [ 801.919177] should_failslab+0x5/0x20 [ 801.920079] kmem_cache_alloc+0x5b/0x310 [ 801.921026] ? lock_downgrade+0x6d0/0x6d0 [ 801.922008] create_object.isra.0+0x3a/0xa20 [ 801.923037] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 801.924233] __kmalloc_node+0x1ae/0x420 [ 801.925153] kvmalloc_node+0x119/0x170 [ 801.926049] setxattr+0x14e/0x330 [ 801.926853] ? vfs_setxattr+0x270/0x270 [ 801.927779] ? filename_lookup+0x3c8/0x570 [ 801.928787] ? lock_acquire+0x197/0x470 [ 801.929696] ? path_setxattr+0xb5/0x190 [ 801.930613] ? lock_release+0x680/0x680 [ 801.931530] ? strncpy_from_user+0x9e/0x470 [ 801.932547] ? __mnt_want_write+0x196/0x280 [ 801.933566] path_setxattr+0x174/0x190 [ 801.934471] ? setxattr+0x330/0x330 [ 801.935309] ? __ia32_sys_read+0xb0/0xb0 [ 801.936261] __x64_sys_setxattr+0xc0/0x160 [ 801.937235] ? syscall_enter_from_user_mode+0x1d/0x50 [ 801.938407] do_syscall_64+0x33/0x40 [ 801.939259] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 801.940491] RIP: 0033:0x7fc989863b19 [ 801.941461] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 801.945640] RSP: 002b:00007fc986dd9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 801.947364] RAX: ffffffffffffffda RBX: 00007fc989976f60 RCX: 00007fc989863b19 [ 801.948998] RDX: 0000000020000200 RSI: 0000000020000140 RDI: 0000000020000100 [ 801.950623] RBP: 00007fc986dd91d0 R08: 0000000000000000 R09: 0000000000000000 [ 801.952265] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000001 [ 801.953874] R13: 00007fffa31031ff R14: 00007fc986dd9300 R15: 0000000000022000 19:01:50 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x10) 19:01:50 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) 19:02:05 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x18) 19:02:05 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x8) 19:02:05 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x2) 19:02:05 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r0) keyctl$revoke(0x3, 0x0) mincore(&(0x7f0000b1c000/0x3000)=nil, 0x3000, &(0x7f0000000300)=""/108) r1 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x10000) keyctl$get_security(0x11, r2, 0x0, 0x0) r3 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x66, 0x33, 0x36, 0x7, 0x63, 0x62, 0x61, 0x3d, 0x37, 0x33, 0x31, 0x35, 0x37, 0x35, 0x38, 0x39]}, &(0x7f0000000100)={0x0, "345cce8f8dd5e39b6b54a3b7f9211cef20b94b5e8f57adbb67e6d63d22c3e9573ac9f2889fd13accbeee09534bff45a39704a84d5ae56210d6358734a4857ed6", 0x14}, 0x48, r1) keyctl$link(0x8, r2, r3) 19:02:05 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r2 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:02:05 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000002000000483600000000000200"/32], 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) 19:02:05 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 7) 19:02:05 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r0) keyctl$revoke(0x3, 0x0) mincore(&(0x7f0000b1c000/0x3000)=nil, 0x3000, &(0x7f0000000300)=""/108) r1 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x10000) keyctl$get_security(0x11, r2, 0x0, 0x0) r3 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x66, 0x33, 0x36, 0x7, 0x63, 0x62, 0x61, 0x3d, 0x37, 0x33, 0x31, 0x35, 0x37, 0x35, 0x38, 0x39]}, &(0x7f0000000100)={0x0, "345cce8f8dd5e39b6b54a3b7f9211cef20b94b5e8f57adbb67e6d63d22c3e9573ac9f2889fd13accbeee09534bff45a39704a84d5ae56210d6358734a4857ed6", 0x14}, 0x48, r1) keyctl$link(0x8, r2, r3) [ 816.914954] FAULT_INJECTION: forcing a failure. [ 816.914954] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 816.916466] CPU: 0 PID: 6681 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 816.917317] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 816.918343] Call Trace: [ 816.918686] dump_stack+0x107/0x167 [ 816.919143] should_fail.cold+0x5/0xa [ 816.919627] _copy_from_user+0x2e/0x1b0 [ 816.920140] setxattr+0x188/0x330 [ 816.920588] ? vfs_setxattr+0x270/0x270 [ 816.921082] ? filename_lookup+0x3c8/0x570 [ 816.921630] ? lock_acquire+0x197/0x470 [ 816.922131] ? path_setxattr+0xb5/0x190 [ 816.922631] ? lock_release+0x680/0x680 [ 816.923141] ? strncpy_from_user+0x9e/0x470 [ 816.923814] ? __mnt_want_write+0x196/0x280 [ 816.924373] path_setxattr+0x174/0x190 [ 816.924859] ? setxattr+0x330/0x330 [ 816.925318] ? __ia32_sys_read+0xb0/0xb0 [ 816.925832] __x64_sys_setxattr+0xc0/0x160 [ 816.926361] ? syscall_enter_from_user_mode+0x1d/0x50 [ 816.926998] do_syscall_64+0x33/0x40 [ 816.927462] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 816.928094] RIP: 0033:0x7fc989863b19 [ 816.928567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 816.930840] RSP: 002b:00007fc986dd9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 816.931776] RAX: ffffffffffffffda RBX: 00007fc989976f60 RCX: 00007fc989863b19 [ 816.932675] RDX: 0000000020000200 RSI: 0000000020000140 RDI: 0000000020000100 [ 816.933552] RBP: 00007fc986dd91d0 R08: 0000000000000000 R09: 0000000000000000 [ 816.934429] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000001 [ 816.935316] R13: 00007fffa31031ff R14: 00007fc986dd9300 R15: 0000000000022000 19:02:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) (fail_nth: 1) 19:02:05 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 8) 19:02:05 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x24) 19:02:05 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r2 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:02:05 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x3) 19:02:05 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000002000000483600000000000200"/32], 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) 19:02:05 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x10) 19:02:05 executing program 3: pselect6(0x40, &(0x7f0000000080)={0x7fff, 0x5, 0x0, 0x80000000, 0x2, 0x7, 0x7fff, 0xd2}, &(0x7f00000000c0)={0x5, 0x4, 0x1ff, 0x1, 0x9, 0x6, 0x5, 0x8}, &(0x7f0000000180)={0x8, 0x1, 0x8, 0x2, 0x3ff, 0x4, 0x9953, 0x100000001}, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000240)={&(0x7f0000000200)={[0x55502384]}, 0x8}) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @multicast1}, {0x0, @multicast}, 0x0, {0x2, 0x4e23, @empty}, 'veth1_to_team\x00'}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r1, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={0x0, @private, @loopback}, &(0x7f0000000040)=0xc) setsockopt$inet6_opts(r0, 0x29, 0x40, &(0x7f0000000100)=ANY=[], 0x800060) [ 817.135865] FAULT_INJECTION: forcing a failure. [ 817.135865] name failslab, interval 1, probability 0, space 0, times 0 [ 817.137457] CPU: 0 PID: 6697 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 817.138297] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 817.139241] Call Trace: [ 817.139553] dump_stack+0x107/0x167 [ 817.139982] should_fail.cold+0x5/0xa [ 817.140438] ? posix_acl_alloc+0x20/0xb0 [ 817.140908] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 817.141447] should_failslab+0x5/0x20 [ 817.141886] __kmalloc+0x72/0x390 [ 817.142296] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 817.142835] posix_acl_alloc+0x20/0xb0 [ 817.143284] posix_acl_from_xattr+0xf5/0x4c0 [ 817.143797] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 817.144337] posix_acl_xattr_set+0x37/0x1b0 [ 817.144839] __vfs_setxattr+0x10f/0x180 [ 817.145300] ? xattr_resolve_name+0x3e0/0x3e0 [ 817.145832] __vfs_setxattr_noperm+0x11a/0x5f0 [ 817.146370] __vfs_setxattr_locked+0x1c3/0x250 [ 817.146906] vfs_setxattr+0xe8/0x270 [ 817.147345] ? __vfs_setxattr_locked+0x250/0x250 [ 817.147907] setxattr+0x23d/0x330 [ 817.148322] ? vfs_setxattr+0x270/0x270 [ 817.148782] ? filename_lookup+0x3c8/0x570 [ 817.149280] ? lock_acquire+0x197/0x470 [ 817.149738] ? path_setxattr+0xb5/0x190 [ 817.150205] ? lock_release+0x680/0x680 [ 817.150668] ? strncpy_from_user+0x9e/0x470 [ 817.151179] ? __mnt_want_write+0x196/0x280 [ 817.151682] path_setxattr+0x174/0x190 [ 817.152135] ? setxattr+0x330/0x330 [ 817.152574] ? __ia32_sys_read+0xb0/0xb0 [ 817.153048] __x64_sys_setxattr+0xc0/0x160 [ 817.153537] ? syscall_enter_from_user_mode+0x1d/0x50 [ 817.154130] do_syscall_64+0x33/0x40 [ 817.154558] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 817.155141] RIP: 0033:0x7fc989863b19 [ 817.155566] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 817.157649] RSP: 002b:00007fc986dd9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 817.158517] RAX: ffffffffffffffda RBX: 00007fc989976f60 RCX: 00007fc989863b19 [ 817.159334] RDX: 0000000020000200 RSI: 0000000020000140 RDI: 0000000020000100 [ 817.160150] RBP: 00007fc986dd91d0 R08: 0000000000000000 R09: 0000000000000000 [ 817.160970] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000001 [ 817.161780] R13: 00007fffa31031ff R14: 00007fc986dd9300 R15: 0000000000022000 [ 817.170535] FAULT_INJECTION: forcing a failure. [ 817.170535] name failslab, interval 1, probability 0, space 0, times 0 [ 817.173579] CPU: 1 PID: 6693 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 817.175258] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 817.177292] Call Trace: [ 817.177952] dump_stack+0x107/0x167 [ 817.178850] should_fail.cold+0x5/0xa [ 817.179764] ? jbd2__journal_start+0x190/0x7e0 [ 817.180855] should_failslab+0x5/0x20 [ 817.181814] kmem_cache_alloc+0x5b/0x310 [ 817.182811] jbd2__journal_start+0x190/0x7e0 [ 817.183899] __ext4_journal_start_sb+0x214/0x390 [ 817.185080] __ext4_ioctl+0x16a4/0x41a0 [ 817.186079] ? ext4_reset_inode_seed+0x450/0x450 [ 817.187240] ? perf_trace_lock+0xac/0x490 [ 817.188293] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 817.189713] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 817.190942] ? do_vfs_ioctl+0x283/0x10d0 [ 817.191939] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 817.193230] ? generic_block_fiemap+0x60/0x60 [ 817.194319] ? lock_downgrade+0x6d0/0x6d0 [ 817.195329] ? __mutex_unlock_slowpath+0xe1/0x600 [ 817.196500] ? wait_for_completion_io+0x270/0x270 [ 817.197682] ? selinux_file_ioctl+0xb6/0x270 [ 817.198729] ? __ext4_ioctl+0x41a0/0x41a0 [ 817.199730] __x64_sys_ioctl+0x19a/0x210 [ 817.200721] do_syscall_64+0x33/0x40 [ 817.201616] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 817.202857] RIP: 0033:0x7f9b744eab19 [ 817.203742] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 817.208154] RSP: 002b:00007f9b71a60188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 817.209998] RAX: ffffffffffffffda RBX: 00007f9b745fdf60 RCX: 00007f9b744eab19 [ 817.211712] RDX: 0000000000000000 RSI: 0000000000006611 RDI: 0000000000000003 [ 817.213427] RBP: 00007f9b71a601d0 R08: 0000000000000000 R09: 0000000000000000 [ 817.215146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 817.216872] R13: 00007ffed41fb98f R14: 00007f9b71a60300 R15: 0000000000022000 19:02:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) (fail_nth: 2) [ 817.419800] FAULT_INJECTION: forcing a failure. [ 817.419800] name failslab, interval 1, probability 0, space 0, times 0 [ 817.421116] CPU: 0 PID: 6711 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 817.421877] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 817.422799] Call Trace: [ 817.423104] dump_stack+0x107/0x167 [ 817.423508] should_fail.cold+0x5/0xa [ 817.423934] ? create_object.isra.0+0x3a/0xa20 [ 817.424452] should_failslab+0x5/0x20 [ 817.424879] kmem_cache_alloc+0x5b/0x310 [ 817.425329] create_object.isra.0+0x3a/0xa20 [ 817.425816] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 817.426374] kmem_cache_alloc+0x159/0x310 [ 817.426834] jbd2__journal_start+0x190/0x7e0 [ 817.427320] __ext4_journal_start_sb+0x214/0x390 [ 817.427843] __ext4_ioctl+0x16a4/0x41a0 [ 817.428299] ? ext4_reset_inode_seed+0x450/0x450 [ 817.428825] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 817.429400] ? find_held_lock+0x2c/0x110 [ 817.429864] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 817.430493] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 817.431061] ? do_vfs_ioctl+0x283/0x10d0 [ 817.431510] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 817.432086] ? generic_block_fiemap+0x60/0x60 [ 817.432591] ? lock_downgrade+0x6d0/0x6d0 [ 817.433048] ? __mutex_unlock_slowpath+0xe1/0x600 [ 817.433580] ? wait_for_completion_io+0x270/0x270 [ 817.434118] ? selinux_file_ioctl+0xb6/0x270 [ 817.434607] ? __ext4_ioctl+0x41a0/0x41a0 [ 817.435063] __x64_sys_ioctl+0x19a/0x210 [ 817.435512] do_syscall_64+0x33/0x40 [ 817.435922] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 817.436495] RIP: 0033:0x7f9b744eab19 [ 817.436903] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 817.438916] RSP: 002b:00007f9b71a60188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 817.439755] RAX: ffffffffffffffda RBX: 00007f9b745fdf60 RCX: 00007f9b744eab19 [ 817.440552] RDX: 0000000000000000 RSI: 0000000000006611 RDI: 0000000000000003 [ 817.441332] RBP: 00007f9b71a601d0 R08: 0000000000000000 R09: 0000000000000000 [ 817.442113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 817.442893] R13: 00007ffed41fb98f R14: 00007f9b71a60300 R15: 0000000000022000 19:02:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) (fail_nth: 3) 19:02:18 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 9) 19:02:18 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x18) 19:02:18 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r2 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:02:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x42) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x161000, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r1, 0x5000940f, &(0x7f0000000640)={{r1}, "3537784fc6fdd5e06fe4c708792bab5d0bc9d74370caa063f660f42847a4656e64fb8f766150af25edad05ffa3335a9f0a85e63c6fd8dd293916514ed859a2c02299120f9dca079945f71b2027086a996fe50731cbd1b789f5f52c113412eb60f3edb4da73ad9f928fa6bc05a0012a514f0873d32b025c02b20a98a13609c2440ab775a82c81a70765886cb35a2195e9a8ed283978a9dd50e63458010ffc539d48a8bd7d10e4dbb00d44749308a753bff0565972d4ec01263fe23dc9d20b6f27abd2a9a1b3dbd8b208666dba00704dc084b0ca61889cad5ea06c959ab7126f3526522de688221d3a1a74d445265210476a0d4c647f24058949b9d5d9802c923ad164ed989acc6dd8fac054d00ed4d2f76670b9a465e203b96eca05dce1ccaf3d2d4dfe8766ee4f718dfa92443613e2907b953dae3b22f49f08bc2f3916efba5eb61d717047c5a20c7d353c2459517a809a21edb845f90843b90abd24abf5aea9dbaad9ec1161a6671fc7af0ebabd900e4b5e1d75d0b2ea318b9c4bc905e9ca253c457404fd51193721ce9908eaee779a3d26716f7ba2b9dc341418d5f3359ba76d1fdf2eaf0d73a4552a3602bd07e52d1d0720de2c8075847b3e78e9534f69c922a3be1334bf953fccbff9c495b1fef334d2a9aa29ff50fef156dfc5aee8b38ff976cba37a5878333fe2304f5c84b9b7215c72792c408c17e545423c0f581afc795634104b928001944e070f50b72e16541bd4a03a4f25853ccb18022f515b4a606535f74967004e35a45755f3734416d7eb8644fa9af1bc613e59b84ea91e48382e2fe9aefd5c5885fca72c72ac045801b999b316e69439f11f9cf4033779afb71271b3b61bda7728801236505753ba72b3ee4ab6b2c49cc814f0f7b31f2bf40adbd47ec680d7d7df909beefc5f88d5ab2282e4dcda7b534e721c71628dae9a344f360e39823cffd34f3440dd5ecf0a8c7451aaff66966999823c6b14a867d81ad2e2938ccc13042b384418ea7ea0b8d29577ea1591c2474a65602fcd58f609aba97bd62cd006b5865d0a39e744d25b7d22b0434d57a85f6798e43f4baf210260dfd9825e07f1995c5ad94be363170a52d2c908fc4db8c0e4d217d91bbfdedae8febd877c13022deca98519727c11dffb2bc6be93f6c6a1bbcb3f0f6763a86b6905d20e6618d40c3036847f0a5ff189558492af0eb386a5115bd5275804e7d6bdee52348083bf8ff945f0aac9d62fe01f71b6d696b9d448422e5cf402ff948107713b5539052452975a58260a95b0a68a47890fa0ba20df940ec9b2deb7be3ff21c93c9a97ee6f8888a9775c3dc0d48bc21077b0841c6f5099073e0358c07aab56560620ca6ceb5304990f628a4b7b3363847b24576fd9ea176014a02b5a3ddfe4799743b2fc9e316e36e4a1d45f2332f1c18f678e5ac3bca9e32fe6f82eb3f7b5c505f50c1fcfe899e9aa14731dc3e0980be0502d38c6dd8d5432d9a4d2d39ae11e6fdc8918d857fdd96ac8a1ab313ad92a9e687cc11f384cb6e3402260c0b56c6ce40160c2a0684eb1b9b93211bcac7db7efe4ff330ba51737294d8255b6adf8a95dd418eb41bf3196a26df871b3cf2928f8d83a608fb5b12481ffc24218f455568ff3d97080aed9984506747166c6d8eb536ef2ac18590f012a7cf29dde8d4b931370dfd12a6dc3c3a3b5fe210c0f88cd0aab03eb8d718257f9aad3c8cc55b2dd5be97e2b9ef761cc7c33889467a5da3b01715d14396ca204044165499c28e0bb60d331d4edc2e3d65feaa8b8a4e00812b764eb78217553255d0d7cce02782662b5179b5e4808bffdf105c3e8c78b4cc0750c6e72a9680c509af4aae0af710eb144ad216d8b7a51ded2eab3a05ffcf26fbfc8f8ad9d7eadf0d640480235ebc2868d5b78e8297508e055678d4828a2d060a1b98bf6b929e682b674bb4237baaa15edd05418d8c142abe56f7ef30ae3da893912afa4e98ed0af286e5bd62043aaf1a0ba086d3f5a5e02bbb9c0d041cba0b13fcf60438c3d62ca8ecb310b27f713f9d1c4ec436f2bb15701d06c1b3336d67693feb93a22401b264934046b9ceaf4ac0512e70ceb11d08cf4871dd1dac3611036c776b2bfc1dd310c9c3cc0a4eec99f8e91c3923daf022464ad9c7fb2309181b57c853fce3ebf7f043b669ca7c6b934bd5f535b00ba2eca818ade5159c498ae133933faaee10fedf149c64e941de142f14f7959c5adf11bc32530262412f589e5ac1cfb4792da768f0e34f180446699a372b586ef0ba58292baaf7b4537ad41fe1bb63ca4c36838c74d86414fde77d665add94bef530390a729827f32dfc68a661b091ae6561585858a32528debf23a65b23b77fcd7683b77da098d00f96e396a1d7b17957c014152de1a8185ae3894c2a08200abdaff1c83c0dcfda7a5bf03ded0f7e7e88652ea94842622b92bd0344aace9faf963d6bd8431b5b82ab613ed843f7376b29c46527cc6d936c62029e1141037f761895a2247710d93977dda2cfe713debfb3cb03ca1674b7afd0dc3b502854dbf9d91f26334f26c729c2093c3efc14ad0cc830218756553aaa70c91e4879164d2e210ad7c2179de3de47e48e2b45e53a2b677b1f55d386edc4f14ce665d1770face3b792a5127b6d9d188672dfe9efae6fc4220f2901f88a1e36b9a6269896a0e4554c1593e8b365dcc8caefce2d41072b3fbb3ae85521a21f031810b27877884953834f860393a924f805bb1f35e6fd8e6aad83e8bbfdc3f78d38ffb84d305a49cae5c66a8d0264334661eda5e4e974b2a925da5813f1304a841bb9cd432e9c0a93b32384a1377310693b50946fa51d389ca130f2be017d5fbd5b7b4978c9ca2c110aef20c4da71b0276e159b08453c434c453e8ed887c358abb67abe1dab4ad07ac93b20d0d727ea1d37467b3bbbf7fffa8c83b97496df95d80dc98d6c6ce25f2ad00069f93372e6e082cd8bc0e541494cf51aa185e4a831cbe0dd77487e08141c89c26a2f9a8110ce09673d2e2574f297dba7d65c7b45ea09acd148d51e9fba12b0cb27d7e60d2767c19bdabad7418ef5532b2a2f4d9da6bbddfa03c5c2de620a50786c3c5884e34e5bb76b74482b0276faeb3f6a52abad6b619ff34b8d55ed48c3d7ae92b2b217726257e174b1faa77f4e713a42f216621ac3c8488279a76ae3e2304df03be45d46edc21a7ed4dc026cec0b7c28c66052d08ce2acb82624ebae2058ad9256d28df6a0f21d212a4322ec251f1d026df3cc93b0ba3fa4284ff9f23e0d7a9ba7623eb49cf467ce9b2ad336a97284633303baa8207bf049da6b8e3d6664c6d4cf198bf616e50c85a3d80b238ff8ccd68ca0d4e97f940e8e405b5adfee1991b25e1e200f6dafc48b273dbcdf2053d8dee64a51ed09598f92091e4d12bd0ef7fd23a508f345eace5c832b67eb3338217c11917ef1860a14f008066398cd1643c8132ce48b49093fe8ffee45dd2aa64bf3291c753035c189e284f40fba09a0febbd7f0c334de4089e2fafd191058edd8a61cd1e9d01889ef7814964ff395e15aeea8cfde2c0991f58a89a4e6251dca856f935ae77657a03b91061d3086bb720e0fd1eb59578cac1793b6b58f98320814ab564d5fc5f559404d7c730e08b290ac2066a0392d81569f2918dbf81fcd97206bccf2e75a6d6937956ba6bd86592d13bcd6446cf5f8b5ea95661307306e5823c7522fd6e672605ed650cfe91513b0bca6483cc742fe1b9c53cb83a89f1d7cf21976b7c9d7892ccd70d6f8b8851b4124b005d168883385954b8a0919da9576828ddcb97d16bcd3563a3fe25538ec9d3255eff87201be11caf932525359b26e9b287145f7c469c151bef1140bcf9f94d6e67539eb7f9872efae56768bea61e0fc7a00c2fa6f062616a881b50fc9db7fc4bfb44439aa6bf244c7b9a28ba31fc011a88b4e8abc260d57b769ecaf379d8a06ddf477a9432dc21483bd08942b72fbdd61ba7f56baf77ff8a5e8a4fe526fe09ac65d6dc0c21cd7cdf14823f35c79edd39f37c8bafcf5c9d818d183bedb501b885c4f2938d41c88e70c726e12a991d555da1c2815f9d8a56e11ba51c127881beb7a99df2576d98f82881a72bc0f3431b2299a14cf78fd3ebfc5a3c576e6ac9818997bb46b65cbf1fb689aa92e61f89fa458b4bf7a880424ce70b61846803f5c4b52a668b094fcc958fa124b05e530b874bef5c4e1f295cda00b558c3141724421fa46915465742d4d79fcaef42b237872bd30c627f5d92705f8cda48949f859dd201f08b63f5ad48399d3e9a04302fdfcd6513235bfb580e34cce1d3a58b9638824d46fdad4c566f656a5afc9d9dee87e30fa69a7de04b7a59878ccc39dcb70b6b5517eb335fb8061f3a301b4563f4887b797463dd84b0c4fe1879817883ed4dc7b6f15f5c48eeb5462bdb8a8dca6d58b1bb737a090745719ee2aa2f4ce1ca0e527c5767fa1a6ef3824c749eaf3309cc741c8f9a41bd019ddfefb287a6f9fe15119c9d34251ce9c68d8a09ce4447dcd04e48b620fd9cf0386660f5830888f0c5b7b9d21b5723eefba3583be48b4d862249d817d4f22f55aa0a9cafc611996ec5fbcfabc07e00d31216b8efe2c4fbe645d97b10f68dd92419e2372b434106c4828788e994f5a7a6e738f02e77e1fc07be6bad99d1f7313b10ec37b29218ce03452ebcec433f4d17f7a169f2176ecc7558bf969cc3443951724e76bb07f696db4cff369e6e93f51f365fc0f04b6247ec8ebb7774ceeb95c1128e2a8b2cb90d604083cfbd0f1a9cb8fd40983133b36484f7d67caf9d11cd1e6a2bd4e6cef4567adb37f92617ace5388dbd7f7becd67caf902a0a61c3077209f9520c8c59c59d4ca6324ae88bbc1f29d0a2522ef85f45d738188e284d0381aa6b5395b5e77345f062a540ec4372b61b60ff8d52201c25ee5e678a4b21b8d18ad00758645e6d1d0c3dcbe7ca6f428b278e3bb1b860b964a4915f9d1ca35041fcdf7c43005e4d9e8d6fed94c1c7534cf8daa38cda0162caf11a0dc380821537f48de2aa84867bd7c0bce8d228a321b3c6cab200e810f514555f247b0b0b6c9c1728acfa2d063e931e84fd18abd31a871e390209660dca2e1e07100b990dbc26756ec32a1984daf7d5be90ac02e8c488de0aafccb49f5cd8dd3da5a6f3190a62aaedca226be6bf59ad17451d7a4ce9782c73d486c1746cd2ee5ddaee93a407e85f92154a4ba5c99d880ae541e59512bf7829338217d1cdca25c82fb6bec6006cd417f92be3977c3c939eef09ed7485f236f0872f1033a1e0aea21e18bae55ab837ba5399bc9f11e63430cabee2453c17d50d1c8bf7039166e9705a4b721c2c4419076dfe396f6ab789c62dfcd131c03a088a59761154962a7ecbb893b5bf5443756f4b990fe29a6380a8d3efded7b6042397d61e9f0fd4020a0a84f0b72ad2775dd15751d6f9aa53da512ed04b791c4fbe3dd19cecf20224e8e7f01e1f39bc4ea0f0702d5ca7048eb0a59009909eb5530dbe5ee191fb80e2b6415c3a8dfa19ffa9ca32625edd5d602e0bfa91ea3266226a4c47bc49daa324a25cadd1d0be863aea6afa8f8ec81b381fed84794d27a9172ebf530585bdfda62c33826a00d13ae3d20653bebec0df3e0ab997ecc5d962b96a24b02a6f970c01346a0b8ea70f41a45c62c57dfe149a1cbbe6ab443057ca8345f529cf86831bb1865e3b3c71f9b746112709a8e5bca0ee1d1bcb42c72e2b4624cb598ce698a531ef92544639d4b36aa56c101f5d94aa968d140c94e728757fa474fc9db92c088"}) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @dev={0xac, 0x14, 0x14, 0x41}, @remote}, 0xc) setsockopt$inet_mreqsrc(r3, 0x0, 0x25, &(0x7f0000001480)={@dev={0xac, 0x14, 0x14, 0x12}, @rand_addr=0x64010101, @local}, 0xc) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) dup3(r4, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x199400, 0x50) setsockopt$inet_group_source_req(r3, 0x0, 0x2f, &(0x7f0000000240)={0x3, {{0x2, 0x4e22, @broadcast}}, {{0x2, 0x4e20, @loopback}}}, 0x108) close(r3) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000140)={'nat\x00', 0x0, [0x5, 0x5, 0x0, 0x5, 0x94]}, &(0x7f00000001c0)=0x54) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x22b80, 0x1b7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) pipe(&(0x7f0000000040)) ioprio_get$pid(0x3, 0x0) 19:02:18 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x4) 19:02:18 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x64) 19:02:18 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) [ 829.891566] FAULT_INJECTION: forcing a failure. [ 829.891566] name failslab, interval 1, probability 0, space 0, times 0 [ 829.894886] CPU: 0 PID: 6727 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 829.896827] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 829.899235] Call Trace: [ 829.900009] dump_stack+0x107/0x167 [ 829.901096] should_fail.cold+0x5/0xa [ 829.902223] ? create_object.isra.0+0x3a/0xa20 [ 829.903554] should_failslab+0x5/0x20 [ 829.904669] kmem_cache_alloc+0x5b/0x310 [ 829.905854] ? avc_has_perm+0xc5/0x1b0 [ 829.907009] create_object.isra.0+0x3a/0xa20 [ 829.908300] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 829.909776] __kmalloc+0x16e/0x390 [ 829.910829] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 829.911925] posix_acl_alloc+0x20/0xb0 [ 829.913056] posix_acl_from_xattr+0xf5/0x4c0 [ 829.914350] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 829.915673] posix_acl_xattr_set+0x37/0x1b0 [ 829.916959] __vfs_setxattr+0x10f/0x180 [ 829.918130] ? xattr_resolve_name+0x3e0/0x3e0 [ 829.919469] __vfs_setxattr_noperm+0x11a/0x5f0 [ 829.920910] __vfs_setxattr_locked+0x1c3/0x250 [ 829.922187] vfs_setxattr+0xe8/0x270 [ 829.923237] ? __vfs_setxattr_locked+0x250/0x250 [ 829.924600] setxattr+0x23d/0x330 [ 829.925515] ? vfs_setxattr+0x270/0x270 [ 829.926496] ? filename_lookup+0x3c8/0x570 [ 829.927538] ? lock_acquire+0x197/0x470 [ 829.928564] ? path_setxattr+0xb5/0x190 [ 829.929717] ? lock_release+0x680/0x680 [ 829.930673] ? strncpy_from_user+0x9e/0x470 [ 829.931706] ? __mnt_want_write+0x196/0x280 [ 829.932771] path_setxattr+0x174/0x190 [ 829.933708] ? setxattr+0x330/0x330 [ 829.934591] ? __ia32_sys_read+0xb0/0xb0 [ 829.935570] __x64_sys_setxattr+0xc0/0x160 [ 829.936601] ? syscall_enter_from_user_mode+0x1d/0x50 [ 829.937833] do_syscall_64+0x33/0x40 [ 829.938716] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 829.939909] RIP: 0033:0x7fc989863b19 [ 829.940801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 829.945093] RSP: 002b:00007fc986dd9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 829.946903] RAX: ffffffffffffffda RBX: 00007fc989976f60 RCX: 00007fc989863b19 [ 829.948602] RDX: 0000000020000200 RSI: 0000000020000140 RDI: 0000000020000100 [ 829.950276] RBP: 00007fc986dd91d0 R08: 0000000000000000 R09: 0000000000000000 [ 829.951951] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000001 [ 829.953624] R13: 00007fffa31031ff R14: 00007fc986dd9300 R15: 0000000000022000 [ 829.960998] FAULT_INJECTION: forcing a failure. [ 829.960998] name fail_usercopy, interval 1, probability 0, space 0, times 0 19:02:18 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x64) [ 829.962832] CPU: 1 PID: 6731 Comm: syz-executor.2 Not tainted 5.10.240 #1 [ 829.964082] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 829.965371] Call Trace: [ 829.965786] dump_stack+0x107/0x167 [ 829.966351] should_fail.cold+0x5/0xa [ 829.966943] _copy_to_user+0x2e/0x180 [ 829.967545] simple_read_from_buffer+0xcc/0x160 [ 829.968273] proc_fail_nth_read+0x198/0x230 [ 829.968970] ? proc_sessionid_read+0x230/0x230 [ 829.969679] ? security_file_permission+0xb1/0xe0 [ 829.970429] ? proc_sessionid_read+0x230/0x230 [ 829.971138] vfs_read+0x228/0x620 [ 829.971686] ksys_read+0x12d/0x260 [ 829.972242] ? vfs_write+0xb10/0xb10 [ 829.972838] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 829.973648] ? syscall_enter_from_user_mode+0x1d/0x50 [ 829.974453] do_syscall_64+0x33/0x40 [ 829.975033] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 829.975827] RIP: 0033:0x7f9b7449d69c [ 829.976410] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 829.979251] RSP: 002b:00007f9b71a3f170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 829.980443] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9b7449d69c [ 829.981558] RDX: 000000000000000f RSI: 00007f9b71a3f1e0 RDI: 0000000000000005 [ 829.982655] RBP: 00007f9b71a3f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 829.983754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 829.984863] R13: 00007ffed41fb98f R14: 00007f9b71a3f300 R15: 0000000000022000 19:02:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 19:02:18 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xf0) 19:02:18 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x5) 19:02:18 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, 0x0, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:02:18 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:02:18 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 10) 19:02:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x42) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x161000, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r1, 0x5000940f, &(0x7f0000000640)={{r1}, "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"}) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @dev={0xac, 0x14, 0x14, 0x41}, @remote}, 0xc) setsockopt$inet_mreqsrc(r3, 0x0, 0x25, &(0x7f0000001480)={@dev={0xac, 0x14, 0x14, 0x12}, @rand_addr=0x64010101, @local}, 0xc) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) dup3(r4, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x199400, 0x50) setsockopt$inet_group_source_req(r3, 0x0, 0x2f, &(0x7f0000000240)={0x3, {{0x2, 0x4e22, @broadcast}}, {{0x2, 0x4e20, @loopback}}}, 0x108) close(r3) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000140)={'nat\x00', 0x0, [0x5, 0x5, 0x0, 0x5, 0x94]}, &(0x7f00000001c0)=0x54) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x22b80, 0x1b7) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) pipe(&(0x7f0000000040)) ioprio_get$pid(0x3, 0x0) 19:02:18 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x300) 19:02:18 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x112) 19:02:18 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x6) 19:02:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x2) [ 830.289407] FAULT_INJECTION: forcing a failure. [ 830.289407] name failslab, interval 1, probability 0, space 0, times 0 [ 830.292488] CPU: 0 PID: 6753 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 830.294362] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 830.296623] Call Trace: [ 830.297355] dump_stack+0x107/0x167 [ 830.298485] should_fail.cold+0x5/0xa [ 830.299544] ? jbd2__journal_start+0x190/0x7e0 [ 830.300843] should_failslab+0x5/0x20 [ 830.301894] kmem_cache_alloc+0x5b/0x310 [ 830.303009] ? _down_write_nest_lock+0x160/0x160 [ 830.304320] jbd2__journal_start+0x190/0x7e0 [ 830.305546] __ext4_journal_start_sb+0x214/0x390 [ 830.306864] ext4_set_acl+0x22a/0x590 [ 830.307933] ? ext4_get_acl+0x650/0x650 [ 830.308908] ? trace_hardirqs_on+0x5b/0x180 [ 830.310099] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 830.311331] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 830.312613] ? posix_acl_valid+0x204/0x330 [ 830.313664] set_posix_acl+0x226/0x2d0 [ 830.314619] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 830.315738] posix_acl_xattr_set+0x8e/0x1b0 [ 830.316790] __vfs_setxattr+0x10f/0x180 [ 830.317753] ? xattr_resolve_name+0x3e0/0x3e0 [ 830.318859] __vfs_setxattr_noperm+0x11a/0x5f0 [ 830.319969] __vfs_setxattr_locked+0x1c3/0x250 [ 830.321080] vfs_setxattr+0xe8/0x270 [ 830.321994] ? __vfs_setxattr_locked+0x250/0x250 [ 830.323319] setxattr+0x23d/0x330 [ 830.324170] ? vfs_setxattr+0x270/0x270 [ 830.325140] ? filename_lookup+0x3c8/0x570 [ 830.326176] ? lock_acquire+0x197/0x470 [ 830.327125] ? path_setxattr+0xb5/0x190 [ 830.328090] ? lock_release+0x680/0x680 [ 830.329070] ? strncpy_from_user+0x9e/0x470 [ 830.330124] ? __mnt_want_write+0x196/0x280 [ 830.331200] path_setxattr+0x174/0x190 [ 830.332163] ? setxattr+0x330/0x330 [ 830.333087] ? __ia32_sys_read+0xb0/0xb0 [ 830.334115] __x64_sys_setxattr+0xc0/0x160 [ 830.335156] ? syscall_enter_from_user_mode+0x1d/0x50 [ 830.336430] do_syscall_64+0x33/0x40 [ 830.337331] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 830.338550] RIP: 0033:0x7fc989863b19 [ 830.339445] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 830.343854] RSP: 002b:00007fc986dd9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 830.345685] RAX: ffffffffffffffda RBX: 00007fc989976f60 RCX: 00007fc989863b19 [ 830.347370] RDX: 0000000020000200 RSI: 0000000020000140 RDI: 0000000020000100 [ 830.349088] RBP: 00007fc986dd91d0 R08: 0000000000000000 R09: 0000000000000000 [ 830.350803] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000002 [ 830.352516] R13: 00007fffa31031ff R14: 00007fc986dd9300 R15: 0000000000022000 19:02:18 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(0xffffffffffffffff, r0, 0x80000) 19:02:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x4b47) 19:02:33 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, 0x0, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:02:33 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(0xffffffffffffffff, r0, 0x80000) 19:02:33 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x300) 19:02:33 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 11) 19:02:33 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:02:33 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x321) 19:02:33 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x7) [ 845.171859] FAULT_INJECTION: forcing a failure. [ 845.171859] name failslab, interval 1, probability 0, space 0, times 0 [ 845.174392] CPU: 1 PID: 6780 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 845.175855] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 845.177840] Call Trace: [ 845.178540] dump_stack+0x107/0x167 [ 845.179616] should_fail.cold+0x5/0xa [ 845.180809] ? create_object.isra.0+0x3a/0xa20 [ 845.182222] should_failslab+0x5/0x20 [ 845.183391] kmem_cache_alloc+0x5b/0x310 [ 845.184639] ? kasan_save_stack+0x32/0x40 [ 845.185907] create_object.isra.0+0x3a/0xa20 [ 845.187262] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 845.188831] kmem_cache_alloc+0x159/0x310 [ 845.190087] ? _down_write_nest_lock+0x160/0x160 [ 845.191311] jbd2__journal_start+0x190/0x7e0 [ 845.192667] __ext4_journal_start_sb+0x214/0x390 [ 845.193903] ext4_set_acl+0x22a/0x590 [ 845.194896] ? ext4_get_acl+0x650/0x650 [ 845.195916] ? trace_hardirqs_on+0x5b/0x180 [ 845.197030] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 845.198121] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 845.199227] ? posix_acl_valid+0x204/0x330 [ 845.200142] set_posix_acl+0x226/0x2d0 [ 845.201008] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 845.201994] posix_acl_xattr_set+0x8e/0x1b0 [ 845.202923] __vfs_setxattr+0x10f/0x180 [ 845.203781] ? xattr_resolve_name+0x3e0/0x3e0 [ 845.204774] __vfs_setxattr_noperm+0x11a/0x5f0 [ 845.205762] __vfs_setxattr_locked+0x1c3/0x250 [ 845.206747] vfs_setxattr+0xe8/0x270 [ 845.207549] ? __vfs_setxattr_locked+0x250/0x250 [ 845.208590] setxattr+0x23d/0x330 [ 845.209340] ? vfs_setxattr+0x270/0x270 [ 845.210189] ? filename_lookup+0x3c8/0x570 [ 845.211105] ? lock_acquire+0x197/0x470 [ 845.211961] ? path_setxattr+0xb5/0x190 [ 845.212835] ? lock_release+0x680/0x680 [ 845.213699] ? strncpy_from_user+0x9e/0x470 [ 845.214631] ? __mnt_want_write+0x196/0x280 [ 845.215789] path_setxattr+0x174/0x190 [ 845.216649] ? setxattr+0x330/0x330 [ 845.217695] ? __ia32_sys_read+0xb0/0xb0 [ 845.218633] __x64_sys_setxattr+0xc0/0x160 [ 845.219550] ? syscall_enter_from_user_mode+0x1d/0x50 [ 845.220667] do_syscall_64+0x33/0x40 [ 845.221470] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 845.222566] RIP: 0033:0x7fc989863b19 [ 845.223532] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 845.227749] RSP: 002b:00007fc986dd9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 845.229380] RAX: ffffffffffffffda RBX: 00007fc989976f60 RCX: 00007fc989863b19 [ 845.230899] RDX: 0000000020000200 RSI: 0000000020000140 RDI: 0000000020000100 [ 845.232588] RBP: 00007fc986dd91d0 R08: 0000000000000000 R09: 0000000000000000 [ 845.234436] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000002 [ 845.236124] R13: 00007fffa31031ff R14: 00007fc986dd9300 R15: 0000000000022000 19:02:33 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(0xffffffffffffffff, r0, 0x80000) 19:02:33 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x321) 19:02:46 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x700) 19:02:46 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x408) 19:02:46 executing program 6: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:02:46 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, 0x0, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:02:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x4b49) 19:02:46 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 12) 19:02:46 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x8) 19:02:46 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) [ 858.300418] FAULT_INJECTION: forcing a failure. [ 858.300418] name failslab, interval 1, probability 0, space 0, times 0 [ 858.303492] CPU: 1 PID: 6814 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 858.305059] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 858.306924] Call Trace: [ 858.307524] dump_stack+0x107/0x167 [ 858.308356] should_fail.cold+0x5/0xa [ 858.309229] ? create_object.isra.0+0x3a/0xa20 [ 858.310440] should_failslab+0x5/0x20 [ 858.311411] kmem_cache_alloc+0x5b/0x310 19:02:46 executing program 6: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) [ 858.312330] create_object.isra.0+0x3a/0xa20 [ 858.313483] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 858.314787] kmem_cache_alloc+0x159/0x310 19:02:46 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:02:46 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x480) [ 858.315858] start_this_handle+0x674/0x1390 [ 858.316960] ? mark_held_locks+0x9e/0xe0 [ 858.317871] ? __jbd2_journal_unfile_buffer+0xb0/0xb0 [ 858.319040] ? trace_hardirqs_on+0x5b/0x180 [ 858.320024] ? kmem_cache_alloc+0x2a6/0x310 [ 858.321164] ? _down_write_nest_lock+0x160/0x160 [ 858.322384] jbd2__journal_start+0x390/0x7e0 [ 858.323384] __ext4_journal_start_sb+0x214/0x390 [ 858.324461] ext4_set_acl+0x22a/0x590 [ 858.325334] ? ext4_get_acl+0x650/0x650 [ 858.326328] ? trace_hardirqs_on+0x5b/0x180 [ 858.327487] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 858.328626] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 858.329744] ? posix_acl_valid+0x204/0x330 [ 858.330880] set_posix_acl+0x226/0x2d0 [ 858.331891] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 858.332956] posix_acl_xattr_set+0x8e/0x1b0 [ 858.333938] __vfs_setxattr+0x10f/0x180 [ 858.334950] ? xattr_resolve_name+0x3e0/0x3e0 19:02:46 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) [ 858.336164] __vfs_setxattr_noperm+0x11a/0x5f0 [ 858.337304] __vfs_setxattr_locked+0x1c3/0x250 [ 858.338356] vfs_setxattr+0xe8/0x270 [ 858.339392] ? __vfs_setxattr_locked+0x250/0x250 [ 858.340514] setxattr+0x23d/0x330 [ 858.341313] ? vfs_setxattr+0x270/0x270 [ 858.342215] ? filename_lookup+0x3c8/0x570 [ 858.343258] ? lock_acquire+0x197/0x470 [ 858.344295] ? path_setxattr+0xb5/0x190 [ 858.345216] ? lock_release+0x680/0x680 [ 858.346129] ? strncpy_from_user+0x9e/0x470 [ 858.347175] ? __mnt_want_write+0x196/0x280 [ 858.348312] path_setxattr+0x174/0x190 [ 858.349208] ? setxattr+0x330/0x330 [ 858.350040] ? __ia32_sys_read+0xb0/0xb0 [ 858.350960] __x64_sys_setxattr+0xc0/0x160 [ 858.351946] ? syscall_enter_from_user_mode+0x1d/0x50 [ 858.353330] do_syscall_64+0x33/0x40 [ 858.354193] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 858.355366] RIP: 0033:0x7fc989863b19 [ 858.356232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 858.360783] RSP: 002b:00007fc986dd9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 858.362624] RAX: ffffffffffffffda RBX: 00007fc989976f60 RCX: 00007fc989863b19 [ 858.364391] RDX: 0000000020000200 RSI: 0000000020000140 RDI: 0000000020000100 [ 858.366042] RBP: 00007fc986dd91d0 R08: 0000000000000000 R09: 0000000000000000 [ 858.367948] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000002 [ 858.369596] R13: 00007fffa31031ff R14: 00007fc986dd9300 R15: 0000000000022000 19:02:46 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 13) 19:02:46 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x10) 19:02:46 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x1800) 19:02:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x541b) 19:02:46 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x500) 19:02:46 executing program 6: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:02:46 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 858.635981] FAULT_INJECTION: forcing a failure. [ 858.635981] name failslab, interval 1, probability 0, space 0, times 0 [ 858.639082] CPU: 1 PID: 6843 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 858.640531] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 858.642292] Call Trace: [ 858.642854] dump_stack+0x107/0x167 [ 858.643625] should_fail.cold+0x5/0xa [ 858.644427] ? create_object.isra.0+0x3a/0xa20 [ 858.645397] should_failslab+0x5/0x20 [ 858.646169] kmem_cache_alloc+0x5b/0x310 [ 858.647015] ? __jbd2_journal_unfile_buffer+0xb0/0xb0 [ 858.648100] create_object.isra.0+0x3a/0xa20 [ 858.649026] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 858.650097] __kmalloc+0x16e/0x390 19:02:46 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x555) [ 858.650974] __ext4_set_acl+0xdd/0x5a0 [ 858.651844] ext4_set_acl+0x327/0x590 [ 858.652654] ? ext4_get_acl+0x650/0x650 [ 858.653506] ? trace_hardirqs_on+0x5b/0x180 [ 858.654427] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 858.655504] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 858.656598] ? posix_acl_valid+0x204/0x330 [ 858.657508] set_posix_acl+0x226/0x2d0 [ 858.658340] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 858.659322] posix_acl_xattr_set+0x8e/0x1b0 [ 858.660237] __vfs_setxattr+0x10f/0x180 [ 858.661091] ? xattr_resolve_name+0x3e0/0x3e0 [ 858.662055] __vfs_setxattr_noperm+0x11a/0x5f0 [ 858.663039] __vfs_setxattr_locked+0x1c3/0x250 [ 858.664015] vfs_setxattr+0xe8/0x270 [ 858.664823] ? __vfs_setxattr_locked+0x250/0x250 [ 858.665840] setxattr+0x23d/0x330 [ 858.666578] ? vfs_setxattr+0x270/0x270 [ 858.667419] ? filename_lookup+0x3c8/0x570 [ 858.668329] ? lock_acquire+0x197/0x470 [ 858.669176] ? path_setxattr+0xb5/0x190 [ 858.670023] ? lock_release+0x680/0x680 [ 858.670872] ? strncpy_from_user+0x9e/0x470 [ 858.671795] ? __mnt_want_write+0x196/0x280 [ 858.672727] path_setxattr+0x174/0x190 [ 858.673555] ? setxattr+0x330/0x330 [ 858.674329] ? __ia32_sys_read+0xb0/0xb0 [ 858.675199] __x64_sys_setxattr+0xc0/0x160 [ 858.676098] ? syscall_enter_from_user_mode+0x1d/0x50 [ 858.677197] do_syscall_64+0x33/0x40 [ 858.677981] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 858.679070] RIP: 0033:0x7fc989863b19 [ 858.679856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 858.683761] RSP: 002b:00007fc986dd9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 858.685380] RAX: ffffffffffffffda RBX: 00007fc989976f60 RCX: 00007fc989863b19 [ 858.686895] RDX: 0000000020000200 RSI: 0000000020000140 RDI: 0000000020000100 [ 858.688403] RBP: 00007fc986dd91d0 R08: 0000000000000000 R09: 0000000000000000 [ 858.689924] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000002 [ 858.691434] R13: 00007fffa31031ff R14: 00007fc986dd9300 R15: 0000000000022000 19:03:00 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x600) 19:03:00 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x18) 19:03:00 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:03:00 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 14) 19:03:00 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x2000) 19:03:00 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) 19:03:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x5421) 19:03:00 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:03:00 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x24) 19:03:00 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) [ 872.545147] FAULT_INJECTION: forcing a failure. [ 872.545147] name failslab, interval 1, probability 0, space 0, times 0 [ 872.548076] CPU: 1 PID: 6871 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 872.549581] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 872.551396] Call Trace: [ 872.551974] dump_stack+0x107/0x167 [ 872.552766] should_fail.cold+0x5/0xa [ 872.553606] ? ext4_xattr_block_set+0xbb7/0x3040 [ 872.554628] should_failslab+0x5/0x20 [ 872.555456] __kmalloc+0x72/0x390 [ 872.556218] ext4_xattr_block_set+0xbb7/0x3040 [ 872.557224] ? lock_downgrade+0x6d0/0x6d0 [ 872.558134] ? ext4_xattr_set_entry+0x3ba0/0x3ba0 [ 872.559187] ? ext4_xattr_check_entries+0x337/0x3c0 [ 872.560275] ? xattr_find_entry+0x2aa/0x3b0 [ 872.561230] ? ext4_xattr_ibody_set+0x294/0x3a0 [ 872.562244] ext4_xattr_set_handle+0xd4d/0x1320 [ 872.563269] ? ext4_xattr_ibody_set+0x3a0/0x3a0 [ 872.564283] ? __kmalloc+0x16e/0x390 [ 872.565105] ? mark_held_locks+0x9e/0xe0 [ 872.566003] ? kasan_unpoison_shadow+0x33/0x50 [ 872.567001] __ext4_set_acl+0x360/0x5a0 [ 872.567880] ext4_set_acl+0x327/0x590 [ 872.568713] ? ext4_get_acl+0x650/0x650 [ 872.569582] ? trace_hardirqs_on+0x5b/0x180 [ 872.570523] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 872.571622] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 872.572737] ? posix_acl_valid+0x204/0x330 [ 872.573666] set_posix_acl+0x226/0x2d0 [ 872.574515] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 872.575521] posix_acl_xattr_set+0x8e/0x1b0 [ 872.576460] __vfs_setxattr+0x10f/0x180 [ 872.577335] ? xattr_resolve_name+0x3e0/0x3e0 [ 872.578323] __vfs_setxattr_noperm+0x11a/0x5f0 [ 872.579320] __vfs_setxattr_locked+0x1c3/0x250 [ 872.580317] vfs_setxattr+0xe8/0x270 [ 872.581147] ? __vfs_setxattr_locked+0x250/0x250 [ 872.582191] setxattr+0x23d/0x330 [ 872.582946] ? vfs_setxattr+0x270/0x270 [ 872.583812] ? filename_lookup+0x3c8/0x570 [ 872.584745] ? lock_acquire+0x197/0x470 [ 872.585615] ? path_setxattr+0xb5/0x190 [ 872.586482] ? lock_release+0x680/0x680 [ 872.587352] ? strncpy_from_user+0x9e/0x470 [ 872.588303] ? __mnt_want_write+0x196/0x280 [ 872.589258] path_setxattr+0x174/0x190 [ 872.590110] ? setxattr+0x330/0x330 [ 872.590906] ? __ia32_sys_read+0xb0/0xb0 [ 872.591800] __x64_sys_setxattr+0xc0/0x160 [ 872.592720] ? syscall_enter_from_user_mode+0x1d/0x50 [ 872.593848] do_syscall_64+0x33/0x40 [ 872.594657] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 872.595769] RIP: 0033:0x7fc989863b19 [ 872.596574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 872.600598] RSP: 002b:00007fc986dd9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 872.602257] RAX: ffffffffffffffda RBX: 00007fc989976f60 RCX: 00007fc989863b19 [ 872.603808] RDX: 0000000020000200 RSI: 0000000020000140 RDI: 0000000020000100 [ 872.605367] RBP: 00007fc986dd91d0 R08: 0000000000000000 R09: 0000000000000000 [ 872.606927] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000002 [ 872.608488] R13: 00007fffa31031ff R14: 00007fc986dd9300 R15: 0000000000022000 19:03:00 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) 19:03:00 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x2103) 19:03:00 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x700) 19:03:00 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x0, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:03:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x5450) 19:03:01 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 15) [ 872.978312] FAULT_INJECTION: forcing a failure. [ 872.978312] name failslab, interval 1, probability 0, space 0, times 0 [ 872.980816] CPU: 1 PID: 6895 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 872.982316] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 872.984118] Call Trace: [ 872.984693] dump_stack+0x107/0x167 [ 872.985507] should_fail.cold+0x5/0xa [ 872.986338] ? create_object.isra.0+0x3a/0xa20 [ 872.987330] should_failslab+0x5/0x20 [ 872.988157] kmem_cache_alloc+0x5b/0x310 [ 872.989056] create_object.isra.0+0x3a/0xa20 [ 872.990011] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 872.991119] __kmalloc+0x16e/0x390 [ 872.991907] ext4_xattr_block_set+0xbb7/0x3040 [ 872.992921] ? lock_downgrade+0x6d0/0x6d0 [ 872.993835] ? ext4_xattr_set_entry+0x3ba0/0x3ba0 [ 872.994889] ? ext4_xattr_check_entries+0x337/0x3c0 [ 872.995979] ? xattr_find_entry+0x2aa/0x3b0 [ 872.996940] ? ext4_xattr_ibody_set+0x294/0x3a0 [ 872.997959] ext4_xattr_set_handle+0xd4d/0x1320 [ 872.998984] ? ext4_xattr_ibody_set+0x3a0/0x3a0 [ 873.000003] ? __kmalloc+0x16e/0x390 [ 873.000819] ? mark_held_locks+0x9e/0xe0 [ 873.001729] ? kasan_unpoison_shadow+0x33/0x50 [ 873.002728] __ext4_set_acl+0x360/0x5a0 [ 873.003605] ext4_set_acl+0x327/0x590 [ 873.004440] ? ext4_get_acl+0x650/0x650 [ 873.005313] ? trace_hardirqs_on+0x5b/0x180 [ 873.006255] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 873.007356] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 873.008476] ? posix_acl_valid+0x204/0x330 [ 873.009408] set_posix_acl+0x226/0x2d0 [ 873.010256] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 873.011262] posix_acl_xattr_set+0x8e/0x1b0 [ 873.012208] __vfs_setxattr+0x10f/0x180 [ 873.013085] ? xattr_resolve_name+0x3e0/0x3e0 [ 873.014073] __vfs_setxattr_noperm+0x11a/0x5f0 [ 873.015080] __vfs_setxattr_locked+0x1c3/0x250 [ 873.016079] vfs_setxattr+0xe8/0x270 [ 873.016903] ? __vfs_setxattr_locked+0x250/0x250 [ 873.017944] setxattr+0x23d/0x330 [ 873.018700] ? vfs_setxattr+0x270/0x270 [ 873.019561] ? filename_lookup+0x3c8/0x570 [ 873.020493] ? lock_acquire+0x197/0x470 [ 873.021362] ? path_setxattr+0xb5/0x190 [ 873.022230] ? lock_release+0x680/0x680 [ 873.023099] ? strncpy_from_user+0x9e/0x470 [ 873.024044] ? __mnt_want_write+0x196/0x280 [ 873.025000] path_setxattr+0x174/0x190 [ 873.025845] ? setxattr+0x330/0x330 [ 873.026639] ? __ia32_sys_read+0xb0/0xb0 [ 873.027529] __x64_sys_setxattr+0xc0/0x160 [ 873.028451] ? syscall_enter_from_user_mode+0x1d/0x50 [ 873.029579] do_syscall_64+0x33/0x40 [ 873.030389] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 873.031502] RIP: 0033:0x7fc989863b19 [ 873.032309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 873.036316] RSP: 002b:00007fc986dd9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 873.037983] RAX: ffffffffffffffda RBX: 00007fc989976f60 RCX: 00007fc989863b19 [ 873.039538] RDX: 0000000020000200 RSI: 0000000020000140 RDI: 0000000020000100 [ 873.041095] RBP: 00007fc986dd91d0 R08: 0000000000000000 R09: 0000000000000000 [ 873.042658] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000002 [ 873.044221] R13: 00007fffa31031ff R14: 00007fc986dd9300 R15: 0000000000022000 19:03:13 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:03:13 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 16) 19:03:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x5451) 19:03:13 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x804) 19:03:13 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x0, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:03:13 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x64) 19:03:13 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x6400) 19:03:13 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) [ 885.659932] FAULT_INJECTION: forcing a failure. [ 885.659932] name failslab, interval 1, probability 0, space 0, times 0 [ 885.662881] CPU: 1 PID: 6915 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 885.664620] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 885.666481] Call Trace: [ 885.667043] dump_stack+0x107/0x167 [ 885.667815] should_fail.cold+0x5/0xa [ 885.668620] ? create_object.isra.0+0x3a/0xa20 [ 885.669588] should_failslab+0x5/0x20 [ 885.670390] kmem_cache_alloc+0x5b/0x310 [ 885.671261] create_object.isra.0+0x3a/0xa20 [ 885.672189] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 885.673298] __kmalloc+0x16e/0x390 [ 885.674057] ext4_xattr_block_set+0xbb7/0x3040 [ 885.675017] ? wake_up_var+0x120/0x120 [ 885.675850] ? jbd2_journal_cancel_revoke+0x283/0x360 [ 885.676944] ? do_get_write_access+0x4e8/0xef0 [ 885.677915] ? ext4_xattr_set_entry+0x3ba0/0x3ba0 [ 885.678936] ? ext4_xattr_check_entries+0x337/0x3c0 [ 885.679992] ? xattr_find_entry+0x2aa/0x3b0 [ 885.680913] ? ext4_xattr_ibody_set+0x294/0x3a0 [ 885.681908] ext4_xattr_set_handle+0xd4d/0x1320 [ 885.682898] ? ext4_xattr_ibody_set+0x3a0/0x3a0 [ 885.683907] ? asm_sysvec_call_function_single+0x12/0x20 [ 885.685146] ? kasan_unpoison_shadow+0x33/0x50 [ 885.686133] __ext4_set_acl+0x360/0x5a0 [ 885.686984] ext4_set_acl+0x327/0x590 [ 885.687816] ? ext4_get_acl+0x650/0x650 [ 885.688679] ? trace_hardirqs_on+0x5b/0x180 [ 885.689636] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 885.690793] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 885.691907] ? posix_acl_valid+0x204/0x330 [ 885.692824] set_posix_acl+0x226/0x2d0 [ 885.693682] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 885.694672] posix_acl_xattr_set+0x8e/0x1b0 [ 885.695608] __vfs_setxattr+0x10f/0x180 [ 885.696474] ? xattr_resolve_name+0x3e0/0x3e0 [ 885.697480] __vfs_setxattr_noperm+0x11a/0x5f0 [ 885.698471] __vfs_setxattr_locked+0x1c3/0x250 [ 885.699479] vfs_setxattr+0xe8/0x270 [ 885.700292] ? __vfs_setxattr_locked+0x250/0x250 [ 885.701335] setxattr+0x23d/0x330 [ 885.702084] ? vfs_setxattr+0x270/0x270 [ 885.702931] ? filename_lookup+0x3c8/0x570 [ 885.703858] ? lock_acquire+0x197/0x470 [ 885.704715] ? path_setxattr+0xb5/0x190 [ 885.705589] ? lock_release+0x680/0x680 [ 885.706449] ? strncpy_from_user+0x9e/0x470 [ 885.707398] ? __mnt_want_write+0x196/0x280 [ 885.708338] path_setxattr+0x174/0x190 [ 885.709194] ? setxattr+0x330/0x330 [ 885.709965] ? __ia32_sys_read+0xb0/0xb0 [ 885.711046] __x64_sys_setxattr+0xc0/0x160 [ 885.712195] ? syscall_enter_from_user_mode+0x1d/0x50 [ 885.713335] do_syscall_64+0x33/0x40 [ 885.714143] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 885.715243] RIP: 0033:0x7fc989863b19 [ 885.716033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 885.719989] RSP: 002b:00007fc986dd9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 885.721637] RAX: ffffffffffffffda RBX: 00007fc989976f60 RCX: 00007fc989863b19 [ 885.723160] RDX: 0000000020000200 RSI: 0000000020000140 RDI: 0000000020000100 [ 885.724688] RBP: 00007fc986dd91d0 R08: 0000000000000000 R09: 0000000000000000 [ 885.726237] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000002 [ 885.727751] R13: 00007fffa31031ff R14: 00007fc986dd9300 R15: 0000000000022000 19:03:14 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x1030) 19:03:14 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(0xffffffffffffffff, r0, 0x80000) 19:03:14 executing program 6: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:03:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x5452) 19:03:14 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x0, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:03:14 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0xf0) 19:03:14 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x40000) 19:03:14 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 17) [ 886.061717] FAULT_INJECTION: forcing a failure. [ 886.061717] name failslab, interval 1, probability 0, space 0, times 0 [ 886.064524] CPU: 0 PID: 6935 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 886.066266] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 886.068146] Call Trace: [ 886.068717] dump_stack+0x107/0x167 [ 886.069529] should_fail.cold+0x5/0xa [ 886.070351] ? ext4_mb_new_blocks+0x698/0x45c0 [ 886.071323] should_failslab+0x5/0x20 [ 886.072132] kmem_cache_alloc+0x5b/0x310 [ 886.073024] ext4_mb_new_blocks+0x698/0x45c0 [ 886.074020] ? ext4_discard_preallocations+0xd80/0xd80 [ 886.075149] ? lock_release+0x680/0x680 [ 886.075996] ? find_held_lock+0x2c/0x110 [ 886.076905] ext4_new_meta_blocks+0x1e1/0x320 [ 886.077879] ? ext4_should_retry_alloc+0x240/0x240 [ 886.078962] ? __entry_find+0x35f/0x480 [ 886.079824] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 886.080930] ext4_xattr_block_set+0x16b4/0x3040 [ 886.081940] ? wake_up_var+0x120/0x120 [ 886.082800] ? jbd2_journal_cancel_revoke+0x283/0x360 [ 886.083934] ? ext4_xattr_set_entry+0x3ba0/0x3ba0 [ 886.085001] ? ext4_xattr_check_entries+0x337/0x3c0 [ 886.086082] ? xattr_find_entry+0x2aa/0x3b0 [ 886.087036] ? ext4_xattr_ibody_set+0x294/0x3a0 [ 886.088052] ext4_xattr_set_handle+0xd4d/0x1320 [ 886.089088] ? ext4_xattr_ibody_set+0x3a0/0x3a0 [ 886.090106] ? __kmalloc+0x16e/0x390 [ 886.090925] ? mark_held_locks+0x9e/0xe0 [ 886.091828] ? kasan_unpoison_shadow+0x33/0x50 [ 886.092827] __ext4_set_acl+0x360/0x5a0 [ 886.093722] ext4_set_acl+0x327/0x590 [ 886.094556] ? ext4_get_acl+0x650/0x650 [ 886.095411] ? trace_hardirqs_on+0x5b/0x180 [ 886.096354] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 886.097455] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 886.098551] ? posix_acl_valid+0x204/0x330 [ 886.099474] set_posix_acl+0x226/0x2d0 [ 886.100321] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 886.101329] posix_acl_xattr_set+0x8e/0x1b0 [ 886.102264] __vfs_setxattr+0x10f/0x180 [ 886.103129] ? xattr_resolve_name+0x3e0/0x3e0 [ 886.104126] __vfs_setxattr_noperm+0x11a/0x5f0 [ 886.105139] __vfs_setxattr_locked+0x1c3/0x250 [ 886.106141] vfs_setxattr+0xe8/0x270 [ 886.106959] ? __vfs_setxattr_locked+0x250/0x250 [ 886.108006] setxattr+0x23d/0x330 [ 886.108760] ? vfs_setxattr+0x270/0x270 [ 886.109631] ? filename_lookup+0x3c8/0x570 [ 886.110568] ? lock_acquire+0x197/0x470 [ 886.111432] ? path_setxattr+0xb5/0x190 [ 886.112300] ? lock_release+0x680/0x680 [ 886.113180] ? strncpy_from_user+0x9e/0x470 [ 886.114134] ? __mnt_want_write+0x196/0x280 [ 886.115084] path_setxattr+0x174/0x190 [ 886.115931] ? setxattr+0x330/0x330 [ 886.116727] ? __ia32_sys_read+0xb0/0xb0 [ 886.117633] __x64_sys_setxattr+0xc0/0x160 [ 886.118550] ? syscall_enter_from_user_mode+0x1d/0x50 [ 886.119661] do_syscall_64+0x33/0x40 [ 886.120468] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 886.121580] RIP: 0033:0x7fc989863b19 [ 886.122382] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 886.126349] RSP: 002b:00007fc986dd9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 886.127993] RAX: ffffffffffffffda RBX: 00007fc989976f60 RCX: 00007fc989863b19 [ 886.129545] RDX: 0000000020000200 RSI: 0000000020000140 RDI: 0000000020000100 [ 886.131091] RBP: 00007fc986dd91d0 R08: 0000000000000000 R09: 0000000000000000 [ 886.132633] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000002 [ 886.134192] R13: 00007fffa31031ff R14: 00007fc986dd9300 R15: 0000000000022000 19:03:26 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(0xffffffffffffffff, r0, 0x80000) 19:03:26 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x80000) 19:03:26 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, 0x0, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:03:26 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 18) 19:03:26 executing program 6: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:03:26 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x1201) 19:03:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x5460) 19:03:26 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x112) [ 898.496378] FAULT_INJECTION: forcing a failure. [ 898.496378] name failslab, interval 1, probability 0, space 0, times 0 [ 898.497770] CPU: 0 PID: 6961 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 898.498585] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 898.499571] Call Trace: [ 898.499913] dump_stack+0x107/0x167 [ 898.500370] should_fail.cold+0x5/0xa [ 898.500850] ? ext4_mb_new_blocks+0x1fd8/0x45c0 [ 898.501435] should_failslab+0x5/0x20 [ 898.501907] kmem_cache_alloc+0x5b/0x310 [ 898.502426] ext4_mb_new_blocks+0x1fd8/0x45c0 [ 898.502990] ? ext4_discard_preallocations+0xd80/0xd80 [ 898.503595] ? lock_release+0x680/0x680 [ 898.504054] ? find_held_lock+0x2c/0x110 [ 898.504540] ext4_new_meta_blocks+0x1e1/0x320 [ 898.505057] ? ext4_should_retry_alloc+0x240/0x240 [ 898.505648] ? __entry_find+0x35f/0x480 [ 898.506107] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 898.506707] ext4_xattr_block_set+0x16b4/0x3040 [ 898.507252] ? lock_downgrade+0x6d0/0x6d0 [ 898.507744] ? ext4_xattr_set_entry+0x3ba0/0x3ba0 [ 898.508309] ? ext4_xattr_check_entries+0x337/0x3c0 [ 898.508891] ? xattr_find_entry+0x2aa/0x3b0 [ 898.509411] ? ext4_xattr_ibody_set+0x294/0x3a0 [ 898.509956] ext4_xattr_set_handle+0xd4d/0x1320 [ 898.510500] ? ext4_xattr_ibody_set+0x3a0/0x3a0 [ 898.511042] ? __kmalloc+0x16e/0x390 [ 898.511480] ? mark_held_locks+0x9e/0xe0 [ 898.511967] ? kasan_unpoison_shadow+0x33/0x50 [ 898.512500] __ext4_set_acl+0x360/0x5a0 [ 898.512977] ext4_set_acl+0x327/0x590 [ 898.513432] ? ext4_get_acl+0x650/0x650 [ 898.513894] ? trace_hardirqs_on+0x5b/0x180 [ 898.514392] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 898.514979] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 898.515570] ? posix_acl_valid+0x204/0x330 [ 898.516061] set_posix_acl+0x226/0x2d0 [ 898.516511] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 898.517048] posix_acl_xattr_set+0x8e/0x1b0 [ 898.517548] __vfs_setxattr+0x10f/0x180 [ 898.518009] ? xattr_resolve_name+0x3e0/0x3e0 [ 898.518542] __vfs_setxattr_noperm+0x11a/0x5f0 [ 898.519075] __vfs_setxattr_locked+0x1c3/0x250 [ 898.519602] vfs_setxattr+0xe8/0x270 [ 898.520039] ? __vfs_setxattr_locked+0x250/0x250 [ 898.520598] setxattr+0x23d/0x330 [ 898.521000] ? vfs_setxattr+0x270/0x270 [ 898.521465] ? filename_lookup+0x3c8/0x570 [ 898.521961] ? lock_acquire+0x197/0x470 [ 898.522411] ? path_setxattr+0xb5/0x190 [ 898.522879] ? lock_release+0x680/0x680 [ 898.523341] ? strncpy_from_user+0x9e/0x470 [ 898.523850] ? __mnt_want_write+0x196/0x280 [ 898.524360] path_setxattr+0x174/0x190 [ 898.524812] ? setxattr+0x330/0x330 [ 898.525243] ? __ia32_sys_read+0xb0/0xb0 [ 898.525718] __x64_sys_setxattr+0xc0/0x160 [ 898.526204] ? syscall_enter_from_user_mode+0x1d/0x50 [ 898.526798] do_syscall_64+0x33/0x40 [ 898.527226] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 898.527820] RIP: 0033:0x7fc989863b19 [ 898.528250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 898.530375] RSP: 002b:00007fc986dd9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 898.531256] RAX: ffffffffffffffda RBX: 00007fc989976f60 RCX: 00007fc989863b19 [ 898.532069] RDX: 0000000020000200 RSI: 0000000020000140 RDI: 0000000020000100 [ 898.532875] RBP: 00007fc986dd91d0 R08: 0000000000000000 R09: 0000000000000000 [ 898.533695] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000002 [ 898.534516] R13: 00007fffa31031ff R14: 00007fc986dd9300 R15: 0000000000022000 19:03:26 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x1000000) 19:03:26 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(0xffffffffffffffff, r0, 0x80000) 19:03:26 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x1800) 19:03:26 executing program 6: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:03:26 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, 0x0, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:03:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6609) 19:03:26 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 19) 19:03:26 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x300) 19:03:27 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, 0x0, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:03:27 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x2000000) [ 898.855613] FAULT_INJECTION: forcing a failure. [ 898.855613] name failslab, interval 1, probability 0, space 0, times 0 [ 898.858094] CPU: 1 PID: 6987 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 898.859534] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 898.861289] Call Trace: [ 898.861861] dump_stack+0x107/0x167 [ 898.862632] should_fail.cold+0x5/0xa [ 898.863461] ? create_object.isra.0+0x3a/0xa20 [ 898.864424] should_failslab+0x5/0x20 [ 898.865245] kmem_cache_alloc+0x5b/0x310 [ 898.866100] create_object.isra.0+0x3a/0xa20 [ 898.867025] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 898.868088] kmem_cache_alloc+0x159/0x310 [ 898.868959] ext4_mb_new_blocks+0x1fd8/0x45c0 [ 898.869945] ? ext4_discard_preallocations+0xd80/0xd80 [ 898.871050] ? lock_release+0x680/0x680 [ 898.871909] ? find_held_lock+0x2c/0x110 [ 898.872757] ext4_new_meta_blocks+0x1e1/0x320 [ 898.873719] ? ext4_should_retry_alloc+0x240/0x240 [ 898.874758] ? __entry_find+0x35f/0x480 [ 898.875594] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 898.876653] ext4_xattr_block_set+0x16b4/0x3040 [ 898.877645] ? lock_downgrade+0x6d0/0x6d0 [ 898.878515] ? ext4_xattr_set_entry+0x3ba0/0x3ba0 [ 898.879547] ? ext4_xattr_check_entries+0x337/0x3c0 [ 898.880586] ? xattr_find_entry+0x2aa/0x3b0 [ 898.881539] ? ext4_xattr_ibody_set+0x294/0x3a0 [ 898.882521] ext4_xattr_set_handle+0xd4d/0x1320 [ 898.883525] ? ext4_xattr_ibody_set+0x3a0/0x3a0 [ 898.884661] ? __kmalloc+0x16e/0x390 [ 898.885628] ? mark_held_locks+0x9e/0xe0 [ 898.886665] ? kasan_unpoison_shadow+0x33/0x50 [ 898.887782] __ext4_set_acl+0x360/0x5a0 [ 898.888625] ext4_set_acl+0x327/0x590 [ 898.889449] ? ext4_get_acl+0x650/0x650 [ 898.890272] ? trace_hardirqs_on+0x5b/0x180 [ 898.891179] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 898.892242] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 898.893330] ? posix_acl_valid+0x204/0x330 [ 898.894216] set_posix_acl+0x226/0x2d0 [ 898.895034] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 898.896011] posix_acl_xattr_set+0x8e/0x1b0 [ 898.896911] __vfs_setxattr+0x10f/0x180 [ 898.897742] ? xattr_resolve_name+0x3e0/0x3e0 [ 898.898692] __vfs_setxattr_noperm+0x11a/0x5f0 [ 898.899671] __vfs_setxattr_locked+0x1c3/0x250 [ 898.900623] vfs_setxattr+0xe8/0x270 [ 898.901443] ? __vfs_setxattr_locked+0x250/0x250 [ 898.902438] setxattr+0x23d/0x330 [ 898.903165] ? vfs_setxattr+0x270/0x270 [ 898.903988] ? filename_lookup+0x3c8/0x570 [ 898.904886] ? lock_acquire+0x197/0x470 [ 898.905718] ? path_setxattr+0xb5/0x190 [ 898.906564] ? lock_release+0x680/0x680 [ 898.907400] ? strncpy_from_user+0x9e/0x470 [ 898.908303] ? __mnt_want_write+0x196/0x280 [ 898.909257] path_setxattr+0x174/0x190 [ 898.910079] ? setxattr+0x330/0x330 [ 898.910842] ? __ia32_sys_read+0xb0/0xb0 [ 898.911705] __x64_sys_setxattr+0xc0/0x160 [ 898.912591] ? syscall_enter_from_user_mode+0x1d/0x50 [ 898.913666] do_syscall_64+0x33/0x40 [ 898.914448] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 898.915520] RIP: 0033:0x7fc989863b19 [ 898.916291] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 898.920123] RSP: 002b:00007fc986dd9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 898.921709] RAX: ffffffffffffffda RBX: 00007fc989976f60 RCX: 00007fc989863b19 [ 898.923209] RDX: 0000000020000200 RSI: 0000000020000140 RDI: 0000000020000100 [ 898.924679] RBP: 00007fc986dd91d0 R08: 0000000000000000 R09: 0000000000000000 [ 898.926196] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000002 [ 898.927666] R13: 00007fffa31031ff R14: 00007fc986dd9300 R15: 0000000000022000 19:03:41 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:03:41 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:03:41 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x3000000) 19:03:41 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x2000) 19:03:41 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 20) 19:03:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x660c) 19:03:41 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:03:41 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x321) [ 913.253524] FAULT_INJECTION: forcing a failure. [ 913.253524] name failslab, interval 1, probability 0, space 0, times 0 [ 913.256119] CPU: 0 PID: 7008 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 913.257593] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 913.259362] Call Trace: [ 913.259953] dump_stack+0x107/0x167 [ 913.260765] should_fail.cold+0x5/0xa [ 913.261617] ? create_object.isra.0+0x3a/0xa20 [ 913.262613] should_failslab+0x5/0x20 [ 913.263443] kmem_cache_alloc+0x5b/0x310 [ 913.264356] create_object.isra.0+0x3a/0xa20 [ 913.265288] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 19:03:41 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) [ 913.266385] kmem_cache_alloc+0x159/0x310 [ 913.267387] ext4_mb_new_blocks+0x1fd8/0x45c0 [ 913.268398] ? ext4_discard_preallocations+0xd80/0xd80 [ 913.269528] ? lock_release+0x680/0x680 [ 913.270391] ? find_held_lock+0x2c/0x110 [ 913.271292] ext4_new_meta_blocks+0x1e1/0x320 [ 913.272246] ? ext4_should_retry_alloc+0x240/0x240 [ 913.273323] ? __entry_find+0x35f/0x480 [ 913.274167] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 913.275264] ext4_xattr_block_set+0x16b4/0x3040 [ 913.276248] ? wake_up_var+0x120/0x120 [ 913.277092] ? jbd2_journal_cancel_revoke+0x283/0x360 [ 913.278222] ? ext4_xattr_set_entry+0x3ba0/0x3ba0 [ 913.279267] ? ext4_xattr_check_entries+0x337/0x3c0 [ 913.280328] ? xattr_find_entry+0x2aa/0x3b0 [ 913.281268] ? ext4_xattr_ibody_set+0x294/0x3a0 [ 913.282286] ext4_xattr_set_handle+0xd4d/0x1320 [ 913.283297] ? ext4_xattr_ibody_set+0x3a0/0x3a0 [ 913.284293] ? __kmalloc+0x16e/0x390 [ 913.285104] ? mark_held_locks+0x9e/0xe0 [ 913.285999] ? kasan_unpoison_shadow+0x33/0x50 [ 913.286976] __ext4_set_acl+0x360/0x5a0 [ 913.287853] ext4_set_acl+0x327/0x590 [ 913.288680] ? ext4_get_acl+0x650/0x650 [ 913.289527] ? trace_hardirqs_on+0x5b/0x180 [ 913.290456] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 913.291524] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 913.292616] ? posix_acl_valid+0x204/0x330 [ 913.293533] set_posix_acl+0x226/0x2d0 [ 913.294356] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 913.295339] posix_acl_xattr_set+0x8e/0x1b0 [ 913.296260] __vfs_setxattr+0x10f/0x180 [ 913.297118] ? xattr_resolve_name+0x3e0/0x3e0 [ 913.298088] ? selinux_sb_clone_mnt_opts+0xc60/0xc60 [ 913.299180] __vfs_setxattr_noperm+0x11a/0x5f0 [ 913.300165] __vfs_setxattr_locked+0x1c3/0x250 [ 913.301153] vfs_setxattr+0xe8/0x270 [ 913.301974] ? __vfs_setxattr_locked+0x250/0x250 [ 913.303007] setxattr+0x23d/0x330 [ 913.303751] ? vfs_setxattr+0x270/0x270 [ 913.304597] ? filename_lookup+0x3c8/0x570 [ 913.305530] ? lock_acquire+0x197/0x470 [ 913.306377] ? path_setxattr+0xb5/0x190 [ 913.307239] ? lock_release+0x680/0x680 [ 913.308099] ? strncpy_from_user+0x9e/0x470 [ 913.309035] ? __mnt_want_write+0x196/0x280 [ 913.309985] path_setxattr+0x174/0x190 [ 913.310827] ? setxattr+0x330/0x330 [ 913.311615] ? __ia32_sys_read+0xb0/0xb0 [ 913.312500] __x64_sys_setxattr+0xc0/0x160 [ 913.313414] ? syscall_enter_from_user_mode+0x1d/0x50 [ 913.314510] do_syscall_64+0x33/0x40 [ 913.315313] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 913.316402] RIP: 0033:0x7fc989863b19 [ 913.317202] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 913.321094] RSP: 002b:00007fc986dd9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 913.322752] RAX: ffffffffffffffda RBX: 00007fc989976f60 RCX: 00007fc989863b19 [ 913.324275] RDX: 0000000020000200 RSI: 0000000020000140 RDI: 0000000020000100 [ 913.325801] RBP: 00007fc986dd91d0 R08: 0000000000000000 R09: 0000000000000000 [ 913.327317] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000002 [ 913.328833] R13: 00007fffa31031ff R14: 00007fc986dd9300 R15: 0000000000022000 19:03:41 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x2103) 19:03:41 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 21) 19:03:41 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x408) 19:03:41 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x4000000) [ 913.542869] FAULT_INJECTION: forcing a failure. [ 913.542869] name failslab, interval 1, probability 0, space 0, times 0 [ 913.545327] CPU: 0 PID: 7029 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 913.546777] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 913.548519] Call Trace: [ 913.549095] dump_stack+0x107/0x167 [ 913.549902] should_fail.cold+0x5/0xa [ 913.550724] ? create_object.isra.0+0x3a/0xa20 [ 913.551696] should_failslab+0x5/0x20 [ 913.552508] kmem_cache_alloc+0x5b/0x310 [ 913.553399] create_object.isra.0+0x3a/0xa20 [ 913.554337] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 913.555437] kmem_cache_alloc+0x159/0x310 [ 913.556345] jbd2_journal_add_journal_head+0x1a3/0x540 [ 913.557478] jbd2_journal_get_create_access+0x40/0x560 [ 913.558635] __ext4_journal_get_create_access+0x43/0x90 [ 913.559783] ext4_xattr_block_set+0x24da/0x3040 [ 913.560789] ? lock_downgrade+0x6d0/0x6d0 [ 913.561714] ? ext4_xattr_set_entry+0x3ba0/0x3ba0 [ 913.562761] ? ext4_xattr_check_entries+0x337/0x3c0 [ 913.563834] ? xattr_find_entry+0x2aa/0x3b0 [ 913.564769] ? ext4_xattr_ibody_set+0x294/0x3a0 [ 913.565782] ext4_xattr_set_handle+0xd4d/0x1320 [ 913.566800] ? ext4_xattr_ibody_set+0x3a0/0x3a0 [ 913.567809] ? __kmalloc+0x16e/0x390 [ 913.568622] ? mark_held_locks+0x9e/0xe0 [ 913.569529] ? kasan_unpoison_shadow+0x33/0x50 [ 913.570516] __ext4_set_acl+0x360/0x5a0 [ 913.571391] ext4_set_acl+0x327/0x590 [ 913.572215] ? ext4_get_acl+0x650/0x650 [ 913.573060] ? trace_hardirqs_on+0x5b/0x180 [ 913.574002] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 913.575087] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 913.576186] ? posix_acl_valid+0x204/0x330 [ 913.577101] set_posix_acl+0x226/0x2d0 [ 913.577953] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 913.578941] posix_acl_xattr_set+0x8e/0x1b0 [ 913.579866] __vfs_setxattr+0x10f/0x180 [ 913.580713] ? xattr_resolve_name+0x3e0/0x3e0 [ 913.581706] __vfs_setxattr_noperm+0x11a/0x5f0 [ 913.582693] __vfs_setxattr_locked+0x1c3/0x250 [ 913.583680] vfs_setxattr+0xe8/0x270 [ 913.584486] ? __vfs_setxattr_locked+0x250/0x250 [ 913.585535] setxattr+0x23d/0x330 [ 913.586280] ? vfs_setxattr+0x270/0x270 [ 913.587128] ? filename_lookup+0x3c8/0x570 [ 913.588057] ? lock_acquire+0x197/0x470 [ 913.588906] ? path_setxattr+0xb5/0x190 [ 913.589776] ? lock_release+0x680/0x680 [ 913.590636] ? strncpy_from_user+0x9e/0x470 [ 913.591573] ? __mnt_want_write+0x196/0x280 [ 913.592514] path_setxattr+0x174/0x190 [ 913.593358] ? setxattr+0x330/0x330 [ 913.594144] ? __ia32_sys_read+0xb0/0xb0 [ 913.595025] __x64_sys_setxattr+0xc0/0x160 [ 913.595931] ? syscall_enter_from_user_mode+0x1d/0x50 [ 913.597029] do_syscall_64+0x33/0x40 [ 913.597819] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 913.598880] RIP: 0033:0x7fc989863b19 [ 913.599674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 913.603527] RSP: 002b:00007fc986dd9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 913.605125] RAX: ffffffffffffffda RBX: 00007fc989976f60 RCX: 00007fc989863b19 [ 913.606627] RDX: 0000000020000200 RSI: 0000000020000140 RDI: 0000000020000100 [ 913.608126] RBP: 00007fc986dd91d0 R08: 0000000000000000 R09: 0000000000000000 [ 913.609626] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000002 [ 913.611121] R13: 00007fffa31031ff R14: 00007fc986dd9300 R15: 0000000000022000 19:03:55 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 22) 19:03:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6612) 19:03:55 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x7000000) 19:03:55 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:03:55 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:03:55 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:03:55 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x2400) 19:03:55 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x480) [ 927.103847] FAULT_INJECTION: forcing a failure. [ 927.103847] name failslab, interval 1, probability 0, space 0, times 0 [ 927.106433] CPU: 1 PID: 7047 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 927.107913] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 927.109702] Call Trace: [ 927.110287] dump_stack+0x107/0x167 [ 927.111086] should_fail.cold+0x5/0xa [ 927.111913] ? jbd2_journal_add_journal_head+0x1a3/0x540 [ 927.113069] should_failslab+0x5/0x20 [ 927.113897] kmem_cache_alloc+0x5b/0x310 [ 927.114779] jbd2_journal_add_journal_head+0x1a3/0x540 [ 927.115910] jbd2_journal_get_create_access+0x40/0x560 [ 927.117039] __ext4_journal_get_create_access+0x43/0x90 [ 927.118193] ext4_xattr_block_set+0x24da/0x3040 [ 927.119196] ? lock_downgrade+0x6d0/0x6d0 [ 927.120096] ? ext4_xattr_set_entry+0x3ba0/0x3ba0 [ 927.121134] ? ext4_xattr_check_entries+0x337/0x3c0 [ 927.122211] ? xattr_find_entry+0x2aa/0x3b0 [ 927.123144] ? ext4_xattr_ibody_set+0x294/0x3a0 [ 927.124146] ext4_xattr_set_handle+0xd4d/0x1320 [ 927.125159] ? ext4_xattr_ibody_set+0x3a0/0x3a0 [ 927.126166] ? __kmalloc+0x16e/0x390 [ 927.126969] ? mark_held_locks+0x9e/0xe0 19:03:55 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) [ 927.127855] ? kasan_unpoison_shadow+0x33/0x50 [ 927.129077] __ext4_set_acl+0x360/0x5a0 [ 927.130120] ext4_set_acl+0x327/0x590 [ 927.131172] ? ext4_get_acl+0x650/0x650 [ 927.132021] ? trace_hardirqs_on+0x5b/0x180 [ 927.132948] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 927.134041] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 927.135141] ? posix_acl_valid+0x204/0x330 [ 927.136049] set_posix_acl+0x226/0x2d0 [ 927.136884] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 927.137876] posix_acl_xattr_set+0x8e/0x1b0 [ 927.138797] __vfs_setxattr+0x10f/0x180 [ 927.139650] ? xattr_resolve_name+0x3e0/0x3e0 [ 927.140619] __vfs_setxattr_noperm+0x11a/0x5f0 [ 927.141610] __vfs_setxattr_locked+0x1c3/0x250 [ 927.142589] vfs_setxattr+0xe8/0x270 [ 927.143390] ? __vfs_setxattr_locked+0x250/0x250 [ 927.144414] setxattr+0x23d/0x330 [ 927.145157] ? vfs_setxattr+0x270/0x270 [ 927.146019] ? filename_lookup+0x3c8/0x570 [ 927.146934] ? lock_acquire+0x197/0x470 [ 927.147780] ? path_setxattr+0xb5/0x190 19:03:55 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) [ 927.148632] ? lock_release+0x680/0x680 [ 927.149666] ? strncpy_from_user+0x9e/0x470 [ 927.150619] ? __mnt_want_write+0x196/0x280 [ 927.151573] path_setxattr+0x174/0x190 [ 927.152429] ? setxattr+0x330/0x330 [ 927.153238] ? __ia32_sys_read+0xb0/0xb0 [ 927.154149] __x64_sys_setxattr+0xc0/0x160 [ 927.155077] ? syscall_enter_from_user_mode+0x1d/0x50 [ 927.156201] do_syscall_64+0x33/0x40 [ 927.157017] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 927.158149] RIP: 0033:0x7fc989863b19 [ 927.158962] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 927.162979] RSP: 002b:00007fc986dd9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 927.164642] RAX: ffffffffffffffda RBX: 00007fc989976f60 RCX: 00007fc989863b19 [ 927.166207] RDX: 0000000020000200 RSI: 0000000020000140 RDI: 0000000020000100 [ 927.167767] RBP: 00007fc986dd91d0 R08: 0000000000000000 R09: 0000000000000000 [ 927.169330] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000002 [ 927.170897] R13: 00007fffa31031ff R14: 00007fc986dd9300 R15: 0000000000022000 [ 927.172755] ENOMEM in journal_alloc_journal_head, retrying. 19:03:55 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x3010) 19:03:55 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 23) 19:03:55 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x500) 19:03:55 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x8000000) 19:03:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6628) 19:03:55 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:03:55 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) [ 927.433672] FAULT_INJECTION: forcing a failure. [ 927.433672] name failslab, interval 1, probability 0, space 0, times 0 [ 927.435280] CPU: 0 PID: 7073 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 927.436247] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 927.437423] Call Trace: [ 927.437811] dump_stack+0x107/0x167 [ 927.438333] should_fail.cold+0x5/0xa [ 927.438876] ? create_object.isra.0+0x3a/0xa20 [ 927.439523] should_failslab+0x5/0x20 [ 927.440062] kmem_cache_alloc+0x5b/0x310 [ 927.440644] create_object.isra.0+0x3a/0xa20 [ 927.441270] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 927.442007] kmem_cache_alloc+0x159/0x310 [ 927.442592] ? jbd2_journal_put_journal_head+0x3f2/0x560 [ 927.443363] mb_cache_entry_create+0xbf/0x910 [ 927.444012] ext4_xattr_block_set+0x26c2/0x3040 [ 927.444683] ? lock_downgrade+0x6d0/0x6d0 [ 927.445287] ? ext4_xattr_set_entry+0x3ba0/0x3ba0 [ 927.445990] ? ext4_xattr_check_entries+0x337/0x3c0 [ 927.446699] ? xattr_find_entry+0x2aa/0x3b0 [ 927.447316] ? ext4_xattr_ibody_set+0x294/0x3a0 [ 927.447980] ext4_xattr_set_handle+0xd4d/0x1320 [ 927.448647] ? ext4_xattr_ibody_set+0x3a0/0x3a0 [ 927.449308] ? __kmalloc+0x16e/0x390 [ 927.449855] ? mark_held_locks+0x9e/0xe0 [ 927.450443] ? kasan_unpoison_shadow+0x33/0x50 [ 927.451095] __ext4_set_acl+0x360/0x5a0 [ 927.451672] ext4_set_acl+0x327/0x590 [ 927.452215] ? ext4_get_acl+0x650/0x650 [ 927.452774] ? trace_hardirqs_on+0x5b/0x180 [ 927.453389] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 927.454107] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 927.454802] ? posix_acl_valid+0x204/0x330 [ 927.455404] set_posix_acl+0x226/0x2d0 [ 927.455956] ? posix_acl_from_xattr+0x4c0/0x4c0 [ 927.456611] posix_acl_xattr_set+0x8e/0x1b0 [ 927.457219] __vfs_setxattr+0x10f/0x180 [ 927.457791] ? xattr_resolve_name+0x3e0/0x3e0 [ 927.458440] __vfs_setxattr_noperm+0x11a/0x5f0 [ 927.459092] __vfs_setxattr_locked+0x1c3/0x250 [ 927.459741] vfs_setxattr+0xe8/0x270 [ 927.460273] ? __vfs_setxattr_locked+0x250/0x250 [ 927.460953] setxattr+0x23d/0x330 [ 927.461443] ? vfs_setxattr+0x270/0x270 [ 927.462010] ? filename_lookup+0x3c8/0x570 [ 927.462619] ? lock_acquire+0x197/0x470 19:03:55 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:03:55 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x555) [ 927.463176] ? path_setxattr+0xb5/0x190 [ 927.463913] ? lock_release+0x680/0x680 [ 927.464486] ? strncpy_from_user+0x9e/0x470 [ 927.465111] ? __mnt_want_write+0x196/0x280 [ 927.465728] path_setxattr+0x174/0x190 [ 927.466274] ? setxattr+0x330/0x330 [ 927.466769] ? __ia32_sys_read+0xb0/0xb0 [ 927.467324] __x64_sys_setxattr+0xc0/0x160 [ 927.467906] ? syscall_enter_from_user_mode+0x1d/0x50 [ 927.468593] do_syscall_64+0x33/0x40 [ 927.469102] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 927.469794] RIP: 0033:0x7fc989863b19 [ 927.470294] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 927.472757] RSP: 002b:00007fc986dd9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 927.473778] RAX: ffffffffffffffda RBX: 00007fc989976f60 RCX: 00007fc989863b19 [ 927.474734] RDX: 0000000020000200 RSI: 0000000020000140 RDI: 0000000020000100 [ 927.475682] RBP: 00007fc986dd91d0 R08: 0000000000000000 R09: 0000000000000000 [ 927.476628] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000002 [ 927.477581] R13: 00007fffa31031ff R14: 00007fc986dd9300 R15: 0000000000022000 19:04:11 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x600) 19:04:11 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x5505) 19:04:11 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:04:11 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x10000000) 19:04:11 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:04:11 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) (fail_nth: 24) 19:04:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x40046629) 19:04:11 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:04:11 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x700) [ 942.852424] FAULT_INJECTION: forcing a failure. [ 942.852424] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 942.855060] CPU: 0 PID: 7100 Comm: syz-executor.4 Not tainted 5.10.240 #1 [ 942.856506] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 942.858264] Call Trace: [ 942.858835] dump_stack+0x107/0x167 [ 942.859615] should_fail.cold+0x5/0xa [ 942.860437] _copy_to_user+0x2e/0x180 [ 942.861259] simple_read_from_buffer+0xcc/0x160 [ 942.862262] proc_fail_nth_read+0x198/0x230 [ 942.863184] ? proc_sessionid_read+0x230/0x230 [ 942.864160] ? security_file_permission+0xb1/0xe0 [ 942.865204] ? proc_sessionid_read+0x230/0x230 [ 942.866185] vfs_read+0x228/0x620 [ 942.866938] ksys_read+0x12d/0x260 [ 942.867692] ? vfs_write+0xb10/0xb10 [ 942.868499] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 942.869609] ? syscall_enter_from_user_mode+0x1d/0x50 19:04:11 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x18000000) [ 942.870712] do_syscall_64+0x33/0x40 [ 942.871652] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 942.872730] RIP: 0033:0x7fc98981669c [ 942.873517] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 942.877387] RSP: 002b:00007fc986dd9170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 942.879004] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc98981669c [ 942.880503] RDX: 000000000000000f RSI: 00007fc986dd91e0 RDI: 0000000000000004 [ 942.882025] RBP: 00007fc986dd91d0 R08: 0000000000000000 R09: 0000000000000000 [ 942.883532] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000002 [ 942.885039] R13: 00007fffa31031ff R14: 00007fc986dd9300 R15: 0000000000022000 19:04:11 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x6400) 19:04:11 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:04:24 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x20000000) 19:04:24 executing program 3: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:04:24 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:04:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x40049409) 19:04:24 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 19:04:24 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:04:24 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x8004) 19:04:24 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x804) 19:04:24 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xf000) 19:04:24 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:04:24 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x21030000) 19:04:24 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x1201) 19:04:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x40086602) 19:04:24 executing program 3: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:04:24 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(0x0, 0x6) dup3(r0, r1, 0x80000) 19:04:24 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x3}}, 0x24, 0x0) 19:04:24 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x80000) 19:04:24 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x64000000) 19:04:24 executing program 3: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:04:25 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x0, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:04:25 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(0x0, 0x6) dup3(r0, r1, 0x80000) 19:04:38 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x4}}, 0x24, 0x0) 19:04:38 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x1800) 19:04:38 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(0x0, 0x6) dup3(r0, r1, 0x80000) 19:04:38 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x0, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:04:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x40086604) 19:04:38 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:04:38 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xf4ffffff) 19:04:38 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x200000) 19:04:38 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x0) dup3(r0, r1, 0x80000) 19:04:38 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:04:38 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xf0ffff) [ 970.411325] EXT4-fs warning (device sda): __ext4_ioctl:889: Setting inode version is not supported with metadata_csum enabled. 19:04:38 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x1f30) 19:04:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x40086607) 19:04:53 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xf5ffffff) 19:04:53 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x2000) 19:04:53 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x0) dup3(r0, r1, 0x80000) 19:04:53 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x0, &(0x7f0000000500)={0x0, 0x4c7f, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:04:53 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:04:53 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x1000000) 19:04:53 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x6}}, 0x24, 0x0) [ 985.633376] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 19:04:53 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:04:53 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x0) dup3(r0, r1, 0x80000) 19:04:53 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x2103) 19:04:53 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0xd}}, 0x24, 0x0) 19:04:53 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, 0x0, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:04:53 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x2000000) 19:04:53 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xf6ffffff) 19:04:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6609) 19:04:54 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:04:54 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, 0x0, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:05:11 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0xf}}, 0x24, 0x0) 19:05:11 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, 0x0, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:05:11 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:05:11 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x2400) 19:05:11 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x3000000) 19:05:11 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xfbffffff) 19:05:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x40087602) 19:05:11 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(0xffffffffffffffff, r0, 0x80000) 19:05:11 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:05:11 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x4000000) 19:05:11 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x301f) [ 1003.094734] EXT4-fs warning (device sda): __ext4_ioctl:889: Setting inode version is not supported with metadata_csum enabled. 19:05:11 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:05:11 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(0xffffffffffffffff, r0, 0x80000) 19:05:11 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xfeffffff) 19:05:11 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x10}}, 0x24, 0x0) 19:05:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x400c6615) 19:05:23 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1fd}}, 0x24, 0x0) 19:05:23 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = syz_io_uring_setup(0x535, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r4}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:05:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x40106614) 19:05:23 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xffffff7f) 19:05:23 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(0xffffffffffffffff, r0, 0x80000) 19:05:23 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:05:23 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x4000) 19:05:23 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x5000000) 19:05:23 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x6000000) 19:05:23 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, 0xffffffffffffffff, 0x80000) 19:05:23 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xfffffff4) 19:05:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x401c5820) 19:05:23 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x201}}, 0x24, 0x0) 19:05:23 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, &(0x7f0000000580), &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:05:23 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(0x0, 0x6) dup3(r0, r1, 0x80000) 19:05:23 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x5505) 19:05:36 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, &(0x7f00000005c0)) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:05:36 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x7000000) 19:05:36 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xfffffff5) 19:05:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x4020940d) 19:05:36 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x6400) 19:05:36 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x300}}, 0x24, 0x0) 19:05:36 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(0x0, 0x6) dup3(r0, r1, 0x80000) 19:05:36 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, 0xffffffffffffffff, 0x80000) 19:05:36 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x8000000) 19:05:36 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(0x0, 0x6) dup3(r0, r1, 0x80000) 19:05:36 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xfffffff6) 19:05:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x40286608) 19:05:36 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, 0xffffffffffffffff, 0x80000) 19:05:36 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x301}}, 0x24, 0x0) 19:05:36 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x8004) 19:05:36 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:05:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x40305828) 19:05:49 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x500}}, 0x24, 0x0) 19:05:49 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xfffffffb) 19:05:49 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:05:49 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0xf000) 19:05:49 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x0) dup3(r0, r1, 0x80000) 19:05:49 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) 19:05:49 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x8040000) 19:05:49 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x10000000) 19:05:49 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) 19:05:49 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xfffffffe) 19:05:49 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x0) dup3(r0, r1, 0x80000) 19:05:49 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x80000) 19:05:49 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x501}}, 0x24, 0x0) 19:05:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x40305829) 19:05:49 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:05:49 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x0) dup3(r0, r1, 0x80000) 19:05:49 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xb3d87b38ed) 19:05:49 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x200000) 19:06:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x4030582a) 19:06:04 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(0xffffffffffffffff, r0, 0x80000) 19:06:04 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0xf0ffff) 19:06:04 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x600}}, 0x24, 0x0) 19:06:04 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000480)={0x0, 0x8ff9, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:06:04 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x1000000000000) 19:06:04 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) 19:06:04 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x10300000) 19:06:04 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(0xffffffffffffffff, r0, 0x80000) 19:06:04 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x12010000) 19:06:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x4030582b) 19:06:04 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x601}}, 0x24, 0x0) 19:06:04 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x1000000) 19:06:04 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:06:19 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:06:19 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x4000000000000) 19:06:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x40305839) 19:06:19 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x18000000) 19:06:19 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:06:19 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(0xffffffffffffffff, r0, 0x80000) 19:06:19 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x2000000) 19:06:19 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x700}}, 0x24, 0x0) 19:06:19 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x8000000000000) 19:06:19 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, 0xffffffffffffffff, 0x80000) 19:06:19 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x3000000) 19:06:36 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x701}}, 0x24, 0x0) 19:06:36 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x21030000) 19:06:36 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x4000000) 19:06:36 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x100000000000000) 19:06:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6609) 19:06:36 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:06:36 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, 0xffffffffffffffff, 0x80000) 19:06:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x40806685) 19:06:36 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x0, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:06:36 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) (fail_nth: 1) 19:06:36 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x801}}, 0x24, 0x0) 19:06:36 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x24000000) 19:06:36 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x200000000000000) 19:06:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6609) 19:06:36 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x5000000) 19:06:36 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, 0xffffffffffffffff, 0x80000) [ 1088.095534] FAULT_INJECTION: forcing a failure. [ 1088.095534] name fail_usercopy, interval 1, probability 0, space 0, times 0 19:06:36 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x55050000) [ 1088.098514] CPU: 0 PID: 7561 Comm: syz-executor.6 Not tainted 5.10.240 #1 [ 1088.100324] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1088.102234] Call Trace: [ 1088.102798] dump_stack+0x107/0x167 [ 1088.103686] should_fail.cold+0x5/0xa [ 1088.104606] _copy_to_user+0x2e/0x180 [ 1088.105526] simple_read_from_buffer+0xcc/0x160 [ 1088.106639] proc_fail_nth_read+0x198/0x230 [ 1088.107685] ? proc_sessionid_read+0x230/0x230 [ 1088.108771] ? security_file_permission+0xb1/0xe0 [ 1088.109936] ? proc_sessionid_read+0x230/0x230 [ 1088.111002] vfs_read+0x228/0x620 [ 1088.111767] ksys_read+0x12d/0x260 [ 1088.112527] ? vfs_write+0xb10/0xb10 [ 1088.113324] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1088.114432] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1088.115538] do_syscall_64+0x33/0x40 [ 1088.116328] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1088.117416] RIP: 0033:0x7f034899a69c [ 1088.118200] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1088.122051] RSP: 002b:00007f0345f5d170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1088.123664] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f034899a69c [ 1088.125168] RDX: 000000000000000f RSI: 00007f0345f5d1e0 RDI: 0000000000000006 [ 1088.126673] RBP: 00007f0345f5d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1088.128198] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1088.129701] R13: 00007ffcffca771f R14: 00007f0345f5d300 R15: 0000000000022000 19:06:36 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x900}}, 0x24, 0x0) 19:06:36 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) 19:06:36 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) 19:06:52 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x0, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:06:52 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x300000000000000) 19:06:52 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x901}}, 0x24, 0x0) 19:06:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x80086601) 19:06:52 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x64000000) 19:06:52 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x2) 19:06:52 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x6000000) 19:06:52 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) (fail_nth: 1) [ 1103.865939] FAULT_INJECTION: forcing a failure. [ 1103.865939] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1103.869220] CPU: 1 PID: 7598 Comm: syz-executor.3 Not tainted 5.10.240 #1 [ 1103.871257] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1103.873404] Call Trace: [ 1103.874083] dump_stack+0x107/0x167 [ 1103.875010] should_fail.cold+0x5/0xa [ 1103.876003] _copy_to_user+0x2e/0x180 [ 1103.876976] simple_read_from_buffer+0xcc/0x160 [ 1103.878149] proc_fail_nth_read+0x198/0x230 [ 1103.879235] ? proc_sessionid_read+0x230/0x230 [ 1103.880415] ? security_file_permission+0xb1/0xe0 [ 1103.881521] ? proc_sessionid_read+0x230/0x230 [ 1103.882581] vfs_read+0x228/0x620 [ 1103.883374] ksys_read+0x12d/0x260 [ 1103.884182] ? vfs_write+0xb10/0xb10 [ 1103.885024] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1103.886214] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1103.887634] do_syscall_64+0x33/0x40 [ 1103.888682] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1103.889893] RIP: 0033:0x7f4e7dabe69c [ 1103.890879] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1103.895743] RSP: 002b:00007f4e7b081170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1103.897725] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f4e7dabe69c [ 1103.899585] RDX: 000000000000000f RSI: 00007f4e7b0811e0 RDI: 0000000000000006 [ 1103.901490] RBP: 00007f4e7b0811d0 R08: 0000000000000000 R09: 0000000000000000 [ 1103.903395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1103.905336] R13: 00007ffc29f9b61f R14: 00007f4e7b081300 R15: 0000000000022000 19:06:52 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0xa00}}, 0x24, 0x0) 19:06:52 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x0, 0x8, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:06:52 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x80040000) 19:06:52 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x7000000) 19:06:52 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x4000) 19:06:52 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x400000000000000) 19:06:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x80086603) 19:06:52 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) 19:07:05 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0xa01}}, 0x24, 0x0) 19:07:05 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x2) 19:07:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x80087601) 19:07:05 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x8000000) 19:07:05 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x0, 0x0, 0x16d, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:07:05 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x8cffffff) 19:07:05 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:07:05 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x700000000000000) 19:07:05 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x4000) 19:07:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x800c6613) 19:07:05 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x8040000) 19:07:05 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x800000000000000) 19:07:05 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xa1ffffff) 19:07:05 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x2000000) 19:07:05 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0xb00}}, 0x24, 0x0) 19:07:05 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r3 = syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9, 0x0, 0x0, 0x0, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:07:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x8010661b) 19:07:20 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000) 19:07:20 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0xb01}}, 0x24, 0x0) 19:07:20 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x10000000) 19:07:20 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x40000000) 19:07:20 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x1000000000000000) 19:07:20 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:07:20 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xe4ffffff) 19:07:20 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xf6ffffff) 19:07:21 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x12010000) 19:07:21 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x1800000000000000) 19:07:21 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:07:21 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x2000000) 19:07:21 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0xc00}}, 0x24, 0x0) 19:07:21 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x3fffffffffe) 19:07:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x801c581f) 19:07:37 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:07:37 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xfbffffff) 19:07:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0xc0045878) 19:07:37 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0xc01}}, 0x24, 0x0) 19:07:37 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x18000000) 19:07:37 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x40000000) 19:07:37 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x3ffffffffff) 19:07:37 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x2000000000000000) 19:07:37 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xfeffffff) 19:07:37 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0xd00}}, 0x24, 0x0) 19:07:37 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x1f300000) 19:07:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0xc0045878) 19:07:37 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000000000) 19:07:37 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x2103000000000000) 19:07:37 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x3fffffffffe) 19:07:37 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:07:51 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x20000000) 19:07:51 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xfffff000) 19:07:51 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b2d2f0cdceceef3c0cd9a8870d6021b82", 0x20}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:07:51 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x3ffffffffff) 19:07:51 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x6400000000000000) 19:07:51 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x200000000000000) 19:07:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0xc0046686) 19:07:51 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0xd01}}, 0x24, 0x0) 19:07:51 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:07:51 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xffffff7f) 19:07:51 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0xe00}}, 0x24, 0x0) 19:07:51 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x80000000000) 19:07:51 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x4000000000000000) 19:07:51 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xed387bd8b3000000) 19:07:51 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x21030000) 19:07:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0xc0096616) 19:08:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0xc0185879) 19:08:04 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:08:04 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xf4ffffff00000000) 19:08:04 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x24000000) 19:08:04 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xffffff8c) 19:08:04 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0xe01}}, 0x24, 0x0) 19:08:04 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x200000000000000) 19:08:04 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0xfeffffffff030000) 19:08:04 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:08:04 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xffffffa1) 19:08:04 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xf5ffffff00000000) 19:08:04 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x40000000) 19:08:04 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0xffffffffff030000) 19:08:04 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0xf00}}, 0x24, 0x0) 19:08:04 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x4000000000000000) 19:08:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0xc0189436) 19:08:19 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xf6ffffff00000000) 19:08:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0xc020660b) 19:08:19 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x5) ioctl(r1, 0x3, &(0x7f0000000100)="e9a8e6ef91db2281d4b283ec6f7c1d5e19eceabe0ac142b6a2c70c93c42b4ac5509e643f7a4eae249a5a82795c0d34c1eeb2baf807182cc51846a1fbd78647351e8dc1d5a3017df0241f22f08f37a24ec6c570c72156e9ddaabb650377be2069743265c4f10a4710670beafae84784e4b8eae070af5ac3d12a2ac399f68202fa3c9f179ff0f39b0be421344cb402d7ad0d6736d81683f8343d6cf45bdcf3b4496a7af7547f473b11b03de42b8844176208f5805843a8e22b99775e1a8c71810815443376205a29b3b2579c9c") r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r2, 0x0) 19:08:19 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0xf01}}, 0x24, 0x0) 19:08:19 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0xfeffffffff030000) 19:08:19 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x55050000) 19:08:19 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xffffffe4) 19:08:19 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:08:19 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1001}}, 0x24, 0x0) 19:08:19 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xf2, 0x3, 0x20, 0x6, 0x0, 0x4, 0x4020, 0x5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x8001, 0x200000}, 0x10, 0x200, 0x1000, 0x1, 0x4, 0x4, 0x7, 0x0, 0x7fff, 0x0, 0x9}, 0x0, 0x1, 0xffffffffffffffff, 0xa) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) 19:08:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0xc020662a) 19:08:19 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x64000000) 19:08:19 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xfbffffff00000000) 19:08:19 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xfffffff6) 19:08:19 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0xffffffffff030000) 19:08:19 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:08:19 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x80040000) 19:08:35 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xfffffffb) 19:08:35 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x8cffffff) 19:08:35 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:08:35 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xfeffffff00000000) 19:08:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0xc028660f) 19:08:35 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = fork() tkill(r1, 0x1c) ptrace$setopts(0x4206, r1, 0x10001, 0x3d) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xb6, 0x0, 0x1, 0xe9, 0x0, 0x1, 0x40005, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000000), 0x9}, 0x10000, 0x6, 0x80000001, 0x7, 0x5, 0x72, 0x1ff, 0x0, 0x800, 0x0, 0x5}, r1, 0xe, r0, 0x8) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r2, 0x0) 19:08:35 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$dupfd(r1, 0x0, r1) dup3(r0, r1, 0x0) 19:08:35 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1100}}, 0x24, 0x0) 19:08:35 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0xa1ffffff) 19:08:35 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xffffff7f00000000) 19:08:35 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xfffffffe) 19:08:35 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:08:51 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1101}}, 0x24, 0x0) 19:08:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0xc0406618) 19:08:51 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:08:51 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xffffffff00000000) 19:08:51 executing program 6: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x5}, r0, 0x2000000000, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f00000004c0)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59Aq\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3Z\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0y\x10\xf9_P\'L\xf5\xd7\xd6\x88\r,\xd0\xe2\xe2\xd5\xdbf\xa0\xe5\xba\xa6\x17~\xa2\xde\xa4n\xd1V\xed\x80\xbbg#6B\xbe#\x9f\xc9\xac\xfcq\xe9=\xb8,\xa5\xe3k\xb2\x92\x85\fokz\xbf\x9b\x83\xaaJ\xa4\x84>\x16\xa5Y\xaf\xf5', 0x4) dup3(r1, r2, 0x0) 19:08:51 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0xe4ffffff) 19:08:51 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xafca628fbd) 19:08:51 executing program 3: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4) r0 = fork() wait4(r0, &(0x7f0000000100), 0x1000000, &(0x7f0000000000)) r1 = fork() ptrace$setopts(0x4206, r1, 0x10001, 0x3d) r2 = getpgid(0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000780)={0x34ec, 0x41, 0x100, 0x70bd26, 0x25dfdbfc, {0xb}, [@nested={0x130c, 0x0, 0x0, 0x1, [@generic="28d6eb283e5b19842b232154db0681d75b5e9188b389811b6b520213bd68c9ecc1eaaf126ef4de8fbecadf337df2738c0ecfe0a2f1decadca96f46071e0c1002c5e5eb81b0db0b3af932c5a50c9eceb885fdf8bcb0511267af0b5c31555ea2d2dc4a6b02f837ffbcca899053fe195101", @generic="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", @typed={0x8, 0x3fe0, 0x0, 0x0, @u32=0x5}, @typed={0x14, 0x78, 0x0, 0x0, @ipv6=@private1}, @typed={0x5, 0x7d, 0x0, 0x0, @str='\x00'}, @typed={0xb1, 0x65, 0x0, 0x0, @binary="1e4a04e4ac0be7e973c2a9b28723b3831d441328567224429463b73bd6917aca41ca4a386a735a00cf2ce87379bdf742fba7f55cff3ae31e51d9d2a0f018dd07292d370b2460fe7c79a4b9d55018a641206733b7b134885d8b82f8b0046df28daf923466f1d7e7e01036aabb4c718702b752de3a030c14fa69e802188e55d25e9c833791f83c5cf69c3be03b219c92db506d00fb1b5c60e6ee434fd97edc0d927e627bf495e01d551b495c08df"}, @typed={0x8, 0x18, 0x0, 0x0, @fd}, @generic="28f1ed56de5f133d65a0fa756d2b6c8a52cd886c66c93d9014c89a55a674e1578110d7b863148ed8dcfb4d56916dc157543f442f58148352201d6b0c56bc90ab3860c6283e996f1d475cf64d9208b3e5704dd07524951285be2df59ddabbd16dddc7fb77096e80f3bf5924281e95f403654e", @generic="376ea3dcbfed1cdd4a59b256a28e92ba46c9ee7f1d8abb1f14b1fb8656d954ce3af02a7c2fee5e2bde03776376208148f33c39770dcf0e3c14cf5851b725959379d7917591b82fdee515cef82d4c64e667374dc0de32ef0bb04f", @generic="39c0529a1cf9c94b650c741b4dbc5ead9261e234da303f74b7fe66c62a85ecb6261c1b49f413ad0252cfcfafbbf8ca09206cc7cc692ee0c8d074391193efc0352b22642fbed0e24cafb01f6c6aa48f3abb9c2dfe1bda7b9658e100160488f6090bf9beb6002aa4dcc83ac8d2c50ceefa65eca985f0f1e217f8d0710e22281dad96a5d0d4967bad36586ec57412f865031ffa00807ec0049a32db47c4415d2d6fac29e3ef8d4a9e5d747402d15bee3070ed3028e1e7162ca64a222fcbdaf89ace97c9404d84c0596c1feff8ded4b3fe7905a51e795b398687e0315f45044a7d152221ff8caf90d3ce53a36b27"]}, @nested={0xd4, 0x5a, 0x0, 0x1, [@generic="bd0fafc683875735c92b5fcea5756064976706638a3ec52454e0d07617723607d9c96000394bcc7ca10ac1b99460bdf52e4d61808551b027237f7442273a36f8b1de2cd412e488d26ad155c42ce91f1bb1a23b67c2c95472a9406c052ee4d8285512b529a6e76e06eaff70951e31f97984781b287f0bfe286e75d184b68067f3362d75f14f1bf8f5adf3b1e7572e56c8804b190b047504e312fb1ca7abc69a32fe65c5ee7086c33e1192899fefd94f281cc26d0528103d71c86a45ebb405e2c4", @typed={0x8, 0x50, 0x0, 0x0, @pid=r0}, @typed={0x8, 0x85, 0x0, 0x0, @pid=0xffffffffffffffff}]}, @typed={0x8, 0x4a, 0x0, 0x0, @fd}, @typed={0x8, 0x7, 0x0, 0x0, @pid=r1}, @generic="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", @nested={0x3a, 0x80, 0x0, 0x1, [@typed={0xc, 0x18, 0x0, 0x0, @u64=0x7}, @generic="f9a6fdbd4fd8ce6b59bb76e42f173d24a8d09529e44c0d9de1395b1537258bf170857283ee53e28e61de"]}, @nested={0xa2, 0x3e, 0x0, 0x1, [@generic="9c09e1028d750079578fc6537a75c63d305b1590fc96bdf0e44602c519f2abb24ac0987de4f3d79be68c1240a6316477492cc05088cd8cb8f964d573e25e3efc14590fd95d8cb11fbe391ce4a29dce86555e290e91dab4bd741b4dc3dc75ca1dc92fd47c7c1a1025b5a7341ce5c969a2f8ee7e22d5bdea80ae5fd029e571f3e7a2dc32e45461ef4dad1634a185e9ea938dd7b9c8cc67fafe1f1a81d803f2"]}, @generic="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", @typed={0x8, 0x1, 0x0, 0x0, @pid=r2}]}, 0x34ec}, 0x1, 0x0, 0x0, 0x80}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xba17}, 0x0, 0x400000000000000, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) r3 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r3, 0x409, 0xe) fallocate(r3, 0x0, 0x0, 0x4) r4 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r4, 0x409, 0xe) fallocate(r4, 0x0, 0x0, 0x4) r5 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r5, 0x409, 0xe) fallocate(r5, 0x0, 0x0, 0x4) dup3(r4, r5, 0x80000) 19:08:52 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x80000000000) 19:08:52 executing program 3: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r6 = pidfd_getfd(r1, r0, 0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r4, &(0x7f0000000000)=@IORING_OP_POLL_ADD={0x6, 0x5, 0x0, @fd=r6, 0x0, 0x0, 0x0, {0x1}, 0x0, {0x0, r7}}, 0x40) r8 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r1, r8, 0x0) 19:08:52 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) 19:08:52 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0xf6ffffff) 19:08:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0xc0406619) 19:08:52 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fallocate(r1, 0x20, 0x2, 0x542) dup3(r0, r1, 0x0) 19:08:52 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1200}}, 0x24, 0x0) 19:08:52 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{0x0}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:08:52 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x1000000000000) 19:09:07 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x119) r1 = memfd_create(&(0x7f00000004c0)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\xdd\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4\xd0\xdad=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x93\xc3\xec\xeb\xab5\xbe}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90I\xa5\x00\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\xf4\xf5E+\xf7e_\xb3\xa6\xd11q\xa6\x1cw)\xe4\xe3\x13@\xc7tKs!\x1b\x8c\xbd\xf0,\xa8\xdd\xac\x81\xdd\x80\x1c\xad\x96\xb0\x1d\xe1S\x14\x87>\x12\x97go\xf1\xecb\x1bJ\xe6\x8c\xf6!\xc2\xa2\x17!J\x8b\x04p\x17\xbeo\x06y{\xf9/\xf0\x940\xc0~\xd9\x14B\xa3\x13\x92\xe3\xc7\xffm!\xcfa\x9ceZ!\x9c\xc4\xce\xbc\xf2\xb1\x87\x1fW\xde#>\xc5\x8b\'y\xa7\xac\x1e`\xa0h3\x0e\xe4\xbe\x1e\xc7el\xfd\xdc\x88\xb1\x9c\xf0\xf7\xa0\x82\xd2\x8a\x91\xc4\xb5\x97E\x02\xee\x1c\xc6\xfc7\x9c\xd3S.d\xb7\xa0r\x9e;Rg\x95\xa1$\xc6\xfd&$\xf1\xb0\x97\n\xa7\x1b\xe5\xafQ\xef\xe8\xecy\xb0s\xa4\xfd6\xf4\x1c\xee\xc0\xe98[\xbc\xc8\xadjCa\xadJ\x9c\xa7M\xc8^\xb3\x16B\x16]\xf5>\r\r\xc3\x17\v\xea\xdc\x98g\xbe:=\xfb\x06\x12\xfc\x8e\xcd\x00\xe8=^\xaa\xca2\xea\xc77\xcb0\xe5\xfb\x86\xae\xdfu\xd0}\xe2E\xdaM\xaa\xad\x9c\x15\x91&\xaf\xdc;I\x81\xb3\xca\xc2\xf4\x95\xf6a\xf6\xbf^)c\xf5\xb6\xef\xb3\x8f\xb2\x95FyG\xaaB\a\x7f\x8e\x90\xb04\x86\xb1\x90\b\x0e\xe4\x11\xcb\xf90\x1eJ\xf5v#\xa5\xee\xeb7}\x80|\xad\xda\x82\xe9bn\xcaN\x85\xb8V\x8d e', 0x6) dup3(r0, r1, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r2, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r2, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x3, 0x4, 0x1f, 0x5, 0x0, 0x1000, 0x1, 0xe, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xffffffff, 0x4, @perf_config_ext={0x7, 0x3}, 0x10005, 0xd325, 0x4, 0x2, 0xc4d6, 0x0, 0x5, 0x0, 0x81, 0x0, 0x80000001}, 0x0, 0xb, r2, 0x8) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x9, 0x1, 0x0, 0x3f, 0x0, 0xcd, 0x24580, 0x6, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000080), 0x5}, 0x394, 0xffffffffffffff00, 0x1000, 0x5, 0x100000001, 0x2, 0x5, 0x0, 0x80000001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) 19:09:07 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0xfbffffff) 19:09:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) dup2(0xffffffffffffffff, r0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 19:09:07 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1201}}, 0x24, 0x0) 19:09:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0xc0506617) 19:09:07 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) 19:09:07 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:09:07 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x8000000000000) 19:09:07 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1300}}, 0x24, 0x0) 19:09:07 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x20000000000000) 19:09:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0xc080661a) 19:09:07 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:09:07 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0xfeffffff) 19:09:07 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0xa8) 19:09:07 executing program 6: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x200000000000, 0x0, 0x0, 0x800000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$getown(r0, 0x9) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x1f, 0xfe, 0xff, 0xb, 0x0, 0x5, 0x900, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x7, 0x7}, 0x241, 0x1, 0x5, 0x6, 0x3, 0x0, 0x9, 0x0, 0x9, 0x0, 0xffff}, r1, 0x3, r2, 0xa) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) syz_io_uring_setup(0x4d4f, &(0x7f0000000180), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_submit(r5, 0x0, &(0x7f0000000000)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x8, 0x0, 0x0, 0x0, {0x54}}, 0x0) dup3(r3, r4, 0x0) 19:09:07 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x16) dup3(0xffffffffffffffff, r0, 0x80000) dup3(r1, r0, 0x80000) 19:09:08 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xf0ffffffffffff) 19:09:08 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1301}}, 0x24, 0x0) 19:09:08 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:09:08 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0xfffff000) 19:09:08 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) memfd_create(&(0x7f0000000000)=',]]@-\x00', 0x4) 19:09:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x40, 0x7fffffff, 0x2) 19:09:08 executing program 3: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x12, r0, 0x461fa000) dup3(r1, r2, 0x0) 19:09:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0xc0c0583b) 19:09:24 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x100000000000000) 19:09:24 executing program 6: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.sched_load_balance\x00', 0x2, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, &(0x7f0000000040)) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000980)='\x04\xe8\xebC\xd7_o\xa4\xbc\xaeo}o\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19\xf6M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0\xb9\x94t\x81\xebP\a|\x8cb\x8e\x8e\xef\x16\x8e\xff\x9a\xa1\xac\x01\xd5\xb0p\xd8\xdf\x12at\xecQ\xe0\t1\xa9\x9f\x874Q\x8d\xcez\x9c\xd2\xcaz\xe42e8Y\xf0\xad\b\x03\b/\xe4w\xb66\x81p\xbfo5e\xb7\xfa\xe1\x89\a\xb7\x96\xdd\x16\x9d\x1d\x16\xa1\t\xcc\xd4VI\xd9\x00k\f-hJf#\xdd\xca\x83\xae\x9b\x0f\xab\x14V\xf7,\x88\xeb\xa5\x86\xe5(\\uP;(\xc8\x16\xf9U\xc8\xd0p\xd4\x92C\xd8,\x1f\xd0\x16o\xdf\xa7\xba\x1e;&\xc4\xc9\xb1\x95\xf7\x93\nwnd\nq\x13\xd3EgX;\xef\x19\x02S\x9d\xaeAdk\x9b\xc1\xc7n]2u\n\xb1T\x89~`>\x8c6\xa0[\xc3\xa94\xd2Ph\x17e\x89m\xa0x\x82d\x99\xc5\x90\xa8PI\xa2\xf7\xad\x9a\xfd\xee\xa5\x7fdU\xb7w\xd9\x19-\x04\x1f\xd8r/\'I\x03i\x12\x18\xa3B\xdf\xa8\x16\xc5\x86\xcf\x11-Q\xf3\xf7y\x993*\xc3\xa5\x18\xf7\vd\x1c\xdb\xcbdi\xee\xc7#/\xf7\x04KN\x86\x17i\xd5o\xcf\xf6\xd9\xa0\x0e\x1d\xe5vFf\x96\xff.\xf2\"\xcbP\x10\x06\xde\x81o;\x81m\xa0\xf4\xcf\xbeG\xe9\xd0$\x80\x83\xb8\x01\xdbFpYp\xe2`p\xbdp\xb4oq\xf5\x84\xc2\xa2|\xcc\xdd\xe7\xc9\x93p|\xde%\x8bGf\x95%;\xca\xeef\xbb\xf3\v\xdf\xb9V\xc4E\xec{s\xe0\xce\x8a\xe55+\xd5\x96w\xdc/\xae\xfd\x9eE\x9d\x91(\xf7\xa1\xb9\x12Z;\x89-\xd2Q\xbfS)1\xd0%[\xba\xec\xfe\x8a\x067\x00(:\xba\xef\xba4e\xc8\xc0\xb7j\xceIhOTPB\x00\xfd\xd7\xd1C\xd5\xa4\xf1?\xec]z\\\xe2\xdf\x1d\xc5c-\xe1\xec\r\xee.\xa3\xc4\xa0\xf5dV6\xa8\x00\xd8\xf0D\x9c\xcf\x15d\xd3E\xa3\xf7:H\xd8~\xf3\x84{\x15\x17mc', 0x6) r3 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000780)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r1, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000180)=""/19, 0x13}, {&(0x7f0000000d00)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/238, 0xee}, {&(0x7f00000002c0)=""/118, 0x76}, {&(0x7f0000000340)=""/142, 0x8e}], 0x5, &(0x7f0000000540)=""/173, 0xad}, 0x0, 0x2000, 0x1, {0x1, r4}}, 0x3) fcntl$addseals(r3, 0x409, 0xe) fallocate(r3, 0x0, 0x0, 0x4) r5 = dup3(r2, r3, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r5, 0xc0189378, &(0x7f00000007c0)={{0x1, 0x1, 0x18, r2, {r0}}, './file0\x00'}) openat(r6, &(0x7f0000000800)='./file0\x00', 0x10400, 0x1) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x201, 0x0) fcntl$getown(r7, 0x9) 19:09:24 executing program 3: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0xb4, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x0) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000000, 0x110, r2, 0x8000000) openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x400, 0x92, 0x4}, 0x18) r4 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r7 = openat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) sync_file_range(r7, 0x1, 0x8, 0x7) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r8 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x100000e, 0x100010, r4, 0x0) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/block/loop5', 0x40000, 0x24) syz_io_uring_submit(r3, r6, &(0x7f0000000500)=@IORING_OP_OPENAT2={0x1c, 0x1, 0x0, r1, &(0x7f0000000400)={0x4000, 0x10, 0x14}, &(0x7f00000004c0)='./file0\x00', 0x18, 0x0, 0x23456}, 0xffff) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0x195bc21884809b5c, r2, 0xcb1f7000) pwrite64(r0, &(0x7f0000000240)="308ed685da46c3da7bf64f87ca5b93194023cd50767af070d379187528b79ef76c1cc043cd029e6b7c2172af8f2145ecac1abab19dd731c5e954db2bc33c4d56f0606f20bbcc5d905643fe4fc37395046d224b5b4477401a1b96e95daec6e56afeddadb7053be44efa619552e0af1d695c9dd4fce9bf967e210ce163fb", 0x7d, 0x3) syz_io_uring_submit(r8, r6, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, r9, 0x0}, 0x8001) syz_io_uring_submit(r3, r6, &(0x7f0000000000)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x4004, @fd=r0, 0x0, 0x7f, 0x8, 0x18, 0x1}, 0x5) 19:09:24 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1400}}, 0x24, 0x0) 19:09:24 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0xffffff7f) 19:09:24 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200081, 0x80) openat(r0, &(0x7f0000000080)='./file0\x00', 0x34a9e52206a6f234, 0x181) creat(&(0x7f0000000040)='./file0\x00', 0x0) 19:09:24 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799fb2a330012b02be5b", 0x10}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:09:24 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1401}}, 0x24, 0x0) 19:09:24 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x200000000000000) 19:09:24 executing program 1: prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000000c0), 0xc4c00, 0x0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r0, 0x40049366, &(0x7f0000000100)=0x4) 19:09:24 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0xffffff8c) 19:09:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x140) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 19:09:24 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 19:09:41 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) r2 = dup3(r0, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x2}}, './file1\x00'}) 19:09:41 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) 19:09:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESOCT=r2, @ANYRESHEX=r0], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) openat(r2, &(0x7f0000000080)='./file0\x00', 0x282400, 0x8) 19:09:41 executing program 1: syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="4de132305051922b17a9874108381f0ed2be6ec09837eb8c24c00d3c0aa27e6efb8a1515f1e6e39496ca503b8f55dfce9b00a9ce4f588a4f256d86435b5d44c3c099a1fe7685d898b700fba512f57a745b27b84ee77a63d3536297d41de173b41de2451d37fabae38dea6e07307104852d5bd55c92e5d8360aede3f27a4d65dced737c93ce52ef13fb661be95e5a0b9e24b6f867c3f41fef7792fe886c0b856ade533f26281214c8a250c303fba16a586c0b692b32c0af72c09737024f77f044371f3642085b8a73c36235aba96d73959b9a29280445c29dfc68c4835edbe2b76d9f0dac6fe93603dd3949be78354f06921f7bc384afc76151ab3e", 0xfb, 0x7}], 0x20104a, &(0x7f0000000200)={[{'\x94'}, {','}, {'/,'}, {'{)'}, {']\\(}'}, {'\''}, {}], [{@uid_gt}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfstransmute={'smackfstransmute', 0x3d, '(]^&v['}}]}) syz_mount_image$nfs(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x8, 0x7, &(0x7f0000001800)=[{&(0x7f0000000340)="4af98eb60bde02a82540bae85d0811e09c8863a3be84da8b0e5caf0f6d7110a54244d3fecb630985ee9d6dabe8cd35838b01c6ff5641f0c9911d63fd3f8b2debde303e41166039e43dfc38cb927620c49985a24df658f76ee8957c6514abec900107cb9eaed9be8a02f46986187fe7600e6ac23c9cd877723222468aa85b2ab4e2637ef3f009da7dec764185227173e9562e977fbc591bdd0f40b8603ea012bf45e839ed07dd4745bea3d082423a6e9ef85ba587c82d773108018eafa47c55edf03e3a81a63f40ffb3f5977206ef0636e65ad80cbdb3ac2a640b663a9387c7a1051193", 0xe3, 0x5}, {&(0x7f0000000440)="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", 0x1000, 0x2}, {&(0x7f0000001440)="94145d1ada0d128f46223ba7207e89a81f904eeba8f6be9f2c9a7926dd879423afc00e025fb7914b27a03b27e7a9f12b42f87cd27dd366670a245cdb830794ced6d06a5e861a1ce22fec76d3cfd1cf2d9e0c4533fbe8c252275732e6bc28370a118a1b7db1092f9b525f75833bccf66e50d5c8e06cd5935fc72cf892b5959f3514f64807ee062eefa117fdc9574a1edd4040174ef16a23bfbbf662580c334f9a16fdcd8e0ce437813239ebde9ddef55a010e04e81618a733bfa9c67c93ff179d2ec93c88afbce0b1bae7427f7ea1e30d2239f6d9952ebbf439a5c7", 0xdb, 0x8000}, {&(0x7f0000001540)="1fcacc61f0bb4913f5fb9590f696a1cd87adcf998578acd96589c8bf44daff4a7b8a0b085f988e44138c51c2b4b7c4cfa0c63014bce6fdd3cbae41cd957a0c8c9a80df995e9c87ef22362db448b572652eb5fbe7e20429ff9035815e250e3696a216defb19d2d7084f0b6bdf6275a0709e066be386ddbd2d6c352e1090c4f3393a0412005adcb2d0052ed46895959d9417d1892db335e8ca7800974d57ff9ccf", 0xa0, 0x10d}, {&(0x7f0000001600)="acd0e5d6775f46ab8f3a152a2a6f827caf8ad8197c931300d12bb48e42252b91f2af5fc4ad0b080b66ed4171098f692b6929b9a7983e29866a308daf2f0e99a4748d313e30b045189ca37f14d39b4b9808b2a1b99e7ff8f6a57c834a41a8f7976265770971a9f67493660a81768afb171ecb84e198c74e54ec0199887eeeee8e76ed3b5d00bff0c1a3252e0a6696bb2f79b1916786ac", 0x96, 0x2}, {&(0x7f00000016c0)="d22f9b0bb348a574b0c4f56c6820e6ee8311b5a4353046b00b4a83b5", 0x1c, 0xff}, {&(0x7f0000001700)="2406760ec85b374b357d410b8ab84ce6fff3c08f7a7db095b206c184deabf5dd4da1dfaf9b2ff8a33e9ad30290579a518329a397fd4ba91cb1ceee5dcf74692bda45d4d21aa2ef7bb5d0ef9f1ab465b3ac48c9a532a957f75a17e6564b815906b889d847fcbaed06b69957114d1ae76ad5382786bd6f1ddcc46905ec67351f28f76e0609f33fc4ed765c062b590a2c675327f84d06a2d16eb6eb9814f053d07ff9de9747e80f9f4305380b50a395b4111f6e778580779e8bb3b075d9b5fcc0dfe2a7cb376a05a9cc4728b5", 0xcb, 0xfba3}], 0x2020, &(0x7f00000018c0)={[{','}, {']\\(}'}, {}, {'*@\''}, {'/,'}, {'nfs\x00'}], [{@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@permit_directio}]}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r0, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r0, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) openat(r0, &(0x7f0000000280)='./file0\x00', 0x3ca24, 0xc7) creat(&(0x7f0000000040)='./file0\x00', 0x0) 19:09:41 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1500}}, 0x24, 0x0) 19:09:41 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:09:41 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x300000000000000) 19:09:41 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0xffffffa1) 19:09:41 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r2, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r2, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x144, 0x0, 0x2, 0x70bd2d, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}, {0xc, 0x8f, 0x8}, {0xc, 0x90, 0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x2}, {0xc, 0x8f, 0x78}, {0xc, 0x90, 0x3}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x2}, {0xc, 0x8f, 0x1}, {0xc, 0x90, 0xda}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}, {0xc, 0x8f, 0x1}, {0xc, 0x90, 0x8001}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc, 0x8f, 0x6}, {0xc}}]}, 0x144}}, 0x4004000) dup3(r0, r1, 0x0) [ 1273.306714] loop1: detected capacity change from 0 to 128512 19:09:41 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x400000000000000) 19:09:41 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1501}}, 0x24, 0x0) 19:09:56 executing program 3: perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) 19:09:56 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x500000000000000) 19:09:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x1f, 0x1, 0x90, 0x20, 0x0, 0x8, 0x8004, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x800a, 0x8, 0x10000, 0x2, 0x9, 0xffffff7f, 0x8, 0x0, 0x7fffffff, 0x0, 0x9}, 0x0, 0xf, r1, 0x8) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 19:09:56 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) flock(r0, 0x0) 19:09:56 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:09:56 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) 19:09:56 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1600}}, 0x24, 0x0) 19:09:56 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0xffffffe4) 19:09:56 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x600000000000000) 19:09:56 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0xfffffff6) 19:09:56 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1601}}, 0x24, 0x0) 19:09:56 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:09:56 executing program 3: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r0, 0x4, 0x8001, 0x6, 0x2}) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r1, r2, 0x0) syz_open_dev$vcsu(&(0x7f0000000000), 0x8, 0x0) r3 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r3, 0x409, 0xe) fallocate(r3, 0x0, 0x0, 0x4) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000080)={0x0, 0x3, r3, 0xfcc3}) 19:09:56 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x100000, 0x3) r1 = dup3(r0, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x101, 0x8) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r2, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r2, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0xd, &(0x7f0000000400)=0x200, 0x4) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f00000000c0)={0x2a0, 0x13, 0x10, 0x70bd29, 0x25dfdbfc, {0x29, 0x5, 0x2, 0x5, {0x4e20, 0x4e20, [0x5, 0x2, 0xffffffff, 0x8], [0x2, 0x5, 0x2, 0x2], 0x0, [0x9, 0x9d0]}, 0x9, 0x7}, [@INET_DIAG_REQ_BYTECODE={0xa2, 0x1, "eb22c622d4d5fa3f4a08e2a2eb5a0608889bb27317760dc80e6a26979d9c3a0ee0ba8faafa6cd98788fa064e932800e93adf30f68eedfe41f70c396a74a0127a4dc5498a96e7401b359933110aa9c2e98f0e19ea89f9f376fe26b9c8b141b5ee96ccbbed5a4638172941f6e50d79af8ade09ded06961b382c4a18db4e7ee398f88060bcb58b02ce255cf99034b5556e118e8342936e9ec7c53886cf235cd"}, @INET_DIAG_REQ_BYTECODE={0x88, 0x1, "0218bf5789e4306ddded069fa0d9b254828b0d72f6641923577a5d96e2c78916364ff3bc2953100a432d7278ca066c78461525b914b1ee36d0d01187f339875616709e3a15522af490bd41e8e46662206ffab6ee5ec238cbfd12b7db5e10fe0fe360c79720f739b774e628398f8d6a5b03631a241a911a04ece2d6c63352a87bb3016976"}, @INET_DIAG_REQ_BYTECODE={0x6a, 0x1, "dd15551fb161e71acc224dcf31f462717935c2f1f2466a6cb05429d91067dc830a2529e93fa09980a59cc7ec2b8a848a2b31110d40c78c2a6440166c445f1b74d7fde90d8c00ff207b101528634c10dc72a3c442a21e87898a29c3dbe1e8fe18a7ec4221e350"}, @INET_DIAG_REQ_BYTECODE={0x23, 0x1, "b267a5116e0161320e4e9fdda27baf16d168396fa461b7168b0cd6c6b61d4b"}, @INET_DIAG_REQ_BYTECODE={0x96, 0x1, "444052c05023724b5582f3a5edc83913a2c51e537806ab846f3fe081ead32f3f20f34e3e6a0498a5ba7c06c258c9e52bac879a3f7308ffde7aa5f460fb4298f4a9493b351ae4c8c129fe572be69ba78dbb0a5d11d55cfad5dc4a52b9db52ed62bc03c5b4261dfc1860fc7695d8d1e668fc35a4528629817501eabf2c2abe7d57089b59f826a24bc6ca020f8742f1e5f13c2d"}]}, 0x2a0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) 19:09:56 executing program 6: r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f0000000180)={0x0, ""/59}, 0x43, 0x0, 0x0) msgsnd(r0, &(0x7f00000000c0)={0x2}, 0x8, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000040)=""/8) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r2, 0x409, 0xe) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x20, @time={0xffffff81, 0x1}, 0xfe, {0x3, 0x7}, 0x0, 0x2, 0x81}) fallocate(r2, 0x0, 0x0, 0x4) dup3(r1, r2, 0x0) 19:09:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3, 0x10010, r1, 0x8000000) r3 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) syz_io_uring_submit(r6, r5, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r5, &(0x7f0000000080)=@IORING_OP_WRITE={0x17, 0x5, 0x4004, @fd_index=0x7, 0xb1, &(0x7f0000000000)="e0f1a1c467ab938ec2e3e75c3a16ed7a6b6cf54cb566d3b10e32ccb58c461b71de3f79", 0x23, 0x1, 0x1, {0x0, r7}}, 0x6) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r8 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r9, r10, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r11 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r8, 0x0) syz_io_uring_submit(r11, r10, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r12 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x1, r12}}, 0x10001) syz_io_uring_submit(r6, r10, &(0x7f00000000c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, {0x3, r12}}, 0x5) 19:09:56 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x700000000000000) 19:10:11 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x800000000000000) 19:10:11 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc0a0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) 19:10:11 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0xfffffffb) 19:10:11 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1700}}, 0x24, 0x0) 19:10:11 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b15bf799f", 0x8}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:10:11 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x76, 0x0, 0x0, 0x1, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$setown(r1, 0x8, 0x0) memfd_create(&(0x7f0000000000)='#*-,/)\x00', 0x2) dup3(r0, r1, 0x0) 19:10:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x1) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 19:10:11 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r1, 0x409, 0xe) fallocate(r1, 0x0, 0x0, 0x4) dup2(r1, r0) memfd_create(&(0x7f0000000180)='#\x00', 0x4) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r2, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r2, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8000000000000000, 0x40000000000004}, 0x8422}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup(r3) r5 = syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r6, &(0x7f0000001480)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001440)={&(0x7f0000001400)={0x40, r5, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x40000) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r4, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x3c, r5, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x3}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x9}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x82}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x40}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000800) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x64, r5, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8001}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x40044}, 0x40000) 19:10:11 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x804000000000000) 19:10:11 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0xfffffffe) 19:10:11 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1701}}, 0x24, 0x0) 19:10:11 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x5, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) 19:10:11 executing program 3: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x100, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa68b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x10003fffffffffd, 0xffffffffffffffff, 0x1) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) openat(r2, &(0x7f0000000040)='./file0\x00', 0x101400, 0x40) openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x48400, 0x0) r3 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r1, r3, 0x0) 19:10:11 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:10:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x414001, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="1c000000810000000400000000000000fe00000000000000030000000000000002000000"], 0x24000) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 19:10:11 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 19:10:11 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x1000000000000000) 19:10:11 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:10:11 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:10:32 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x1030000000000000) 19:10:32 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e0a2b", 0x4}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:10:32 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, 0x0, @perf_config_ext={0x6, 0x83a5}, 0x10823, 0x80, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = getpgrp(0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x5, 0x7f, 0x0, 0x1, 0x0, 0x8000, 0x4, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000000100), 0x7}, 0x202a, 0x7, 0xe, 0x3, 0x1, 0x30b, 0x1, 0x0, 0x1, 0x0, 0xfffffffffffff088}, r1, 0x9, r2, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)=ANY=[@ANYRES64=r1]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000004c0)={0x0, 0x80, 0x8, 0x5, 0xe8, 0x83, 0x0, 0x6, 0x4a08, 0xc, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x8, 0x48a8}, 0x16810, 0x100, 0x800, 0x0, 0xffff, 0x8001, 0x0, 0x0, 0x3, 0x0, 0x800}) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x76, 0x1, 0x8, 0x9, 0x0, 0x4, 0x80401, 0xc2b5faae29df3598, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x4, 0x8, 0x9, 0x8, 0x0, 0x2, 0x3, 0x0, 0x7, 0x0, 0x4e}, r1, 0x4, r2, 0x9) r3 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r3, 0x0) 19:10:32 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0xbabf45e458) 19:10:32 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1800}}, 0x24, 0x0) 19:10:32 executing program 1: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)=@abs, 0x6e, &(0x7f0000000140)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1}, 0x10160) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0xc0, 0x0) recvmsg$unix(r0, &(0x7f0000001500)={&(0x7f0000000200), 0x6e, &(0x7f0000001480)=[{&(0x7f00000012c0)=""/14, 0xe}, {&(0x7f0000001300)=""/21, 0x15}, {&(0x7f0000001340)=""/213, 0xd5}, {&(0x7f0000001440)=""/46, 0x2e}], 0x4, &(0x7f00000014c0)=[@cred={{0x1c}}], 0x20}, 0x20) creat(&(0x7f0000000040)='./file0\x00', 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x42000, 0x21, 0x8}, 0x18) 19:10:32 executing program 6: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe5, 0x6eff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) r3 = mmap$IORING_OFF_SQES(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x8010, r1, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_FILES_UPDATE={0x14, 0x3, 0x0, 0x0, 0x9, &(0x7f0000000140)=[r2], 0x1}, 0x80000000) r4 = fork() wait4(r4, &(0x7f0000000100), 0x1000000, &(0x7f0000000000)) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r4, 0x7, r0, &(0x7f0000000000)={r2, 0xffffffffffffffff, 0x4}) dup3(r1, r2, 0x0) 19:10:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 19:10:32 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x1201000000000000) 19:10:32 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x80000000000) 19:10:32 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1801}}, 0x24, 0x0) 19:10:32 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:10:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x181082, 0x80) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendfile(r0, r1, &(0x7f0000000100)=0x4, 0x1d8c) creat(&(0x7f0000000040)='./file0\x00', 0x0) 19:10:32 executing program 2: ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000000)={'veth0_to_bridge\x00', 0x3}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x2c) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x9000, &(0x7f0000000100)={[{@name={'name', 0x3d, ':$'}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@obj_user={'obj_user', 0x3d, '!'}}, {@obj_user={'obj_user', 0x3d, 'veth0_to_bridge\x00'}}, {@uid_lt={'uid<', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, 'veth0_to_bridge\x00'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_role={'obj_role', 0x3d, 'veth0_to_bridge\x00'}}]}) 19:10:32 executing program 3: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r3, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r3, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) recvmsg$unix(r3, &(0x7f0000001dc0)={&(0x7f0000001c40)=@abs, 0x6e, &(0x7f0000001d80)=[{&(0x7f0000001cc0)=""/132, 0x84}], 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) io_uring_enter(r4, 0x5d7, 0x49b4, 0x1, &(0x7f0000000200)={[0x4]}, 0x8) ioctl$FIBMAP(r2, 0x1, &(0x7f0000002600)=0xfffff801) socket$nl_generic(0x10, 0x3, 0x10) recvmmsg$unix(r1, &(0x7f0000001bc0)=[{{&(0x7f0000000100), 0x6e, &(0x7f00000003c0)=[{&(0x7f00000026c0)=""/166, 0xa6}, {&(0x7f0000000240)=""/87, 0x57}, {&(0x7f0000000080)=""/20, 0x14}, {&(0x7f00000002c0)=""/6, 0x6}, {&(0x7f0000000300)=""/44, 0x2c}, {&(0x7f0000000340)=""/11, 0xb}, {&(0x7f0000000380)=""/12, 0xc}], 0x7, &(0x7f00000004c0)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}}, {{&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f0000002640)=""/118, 0x76}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/81, 0x51}, {&(0x7f00000005c0)=""/34, 0x22}, {&(0x7f0000001880)=""/138, 0x8a}, {&(0x7f0000001940)=""/49, 0x31}, {&(0x7f0000001980)=""/241, 0xf1}], 0x7, &(0x7f0000002780)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="73cae44138751e9398d76a1975f2066571bda596e224736df6989ae6c85592a67cf0fade7440867dfb4bceb7d18b32da9a539f816d330ffc762caeb11401fbb9b7723b6debda5207f2e0e97c54168373af2559a86e889a1e1e523c0231cbbc0223ec9ddf9886aba76641b90231e715341742a119da9732c69ba229229ef9482cfe242c3d14b7e2797165b24adcaaab07a0b91d20c16856fc75e46e3471534eb8cba41aff481a28110a3a2cb3919cb322fade0adb", @ANYRES64], 0xb0}}], 0x2, 0x100, 0x0) dup3(r1, r5, 0x0) 19:10:47 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x1000000000000) 19:10:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x927, 0x5, &(0x7f00000004c0)=[{&(0x7f00000000c0)="b768452e0a9dec25d07aa849e55bea0946cc0d9e212080d41e88d0338813c8bc49c194fd89d0dde9a4a5039d1de2ae04c5a3546f", 0x34, 0x567}, {&(0x7f0000000100)="d7dadd152b507c7871fca996a3247d0cbbf8356f9045083af233121be81a40225959198908368ba666c57c14fb08a7e4c32502d33522280a9d7e57ac8c3d287401011ab9ebb5149d98f5fdcf4fd82e15ce92876663a9c90362b6eb690a0b739166a1b774c152e93d6076d3808e6dc1f76dd423c2b106c200b35ab2c8ad7c5011088c42dd94ab81b5f5d48e0574553b717c8338bbad7adc7225d40293dd30d7d471b61739c17e48f78c7bb8fee0ee", 0xae}, {&(0x7f00000001c0)="da9c3a771178c9f882c96ac44f15e63e5eec143eaebea6c704d135aa1954890c9fba08af2e7110dae927a6ac41618ec1b634c01085610bc99fd782180dd3eaec92ab53fda096f4aae5df1498123e437aa5e7d9d0f5382c3fc5de743e41ced3f5da8637e70039323edc686c0545f25536ae7e7a98c74f8d81fbfbb22594e52a0aba908ef5064dfe759f3df4dc85d866a0eac3e48dec2d0aa9006ef113c79651ff00e2475289160884f4ffc0a3b35738bf1199ece5e328c01538025004ea1da1228c332a75f20c64bab34b2ff273f86012", 0xd0, 0x3}, {&(0x7f00000002c0)="135378feb72706045a3e9e24e1c164694c55a61fc3d9367f6a935b0999f507da77eda3bebc7151dd7e6555b057e0902f4015eb8b69ce7812f209bf73e2f6b38f94327bff45fb3b27909f3921d7608c11bd9e0fc3901c6204aaec1af93cf02dbc7ff223a99e44948b636a077a77d9ab465e107916dab75510a516607f7e1c23f7bd1c059995d2b49c997e2a73ad5f510b8b7df579a9f5aa13020078735cb77ae27c243852764b1200f358cefe4fb64f20c1090fc46f6e567927948b6d7799ab519c9281ecf9a2292dd624d1", 0xcb, 0x10b}, {&(0x7f00000003c0)="f1ddc1a17b795344fb20b92d0100bbb8d922e77ec84b8b20f7ff11da565b5ca91d7425d7ad3299eff207076c61980f54f5462d833a1709319255f8083bc77900d1e1f2ba6fdc371ade90b4417b6b74b14a4099283397bdbf855f12e5eb7f0a5f74e6123068a2b5262a611f9d010c585f8d902918b50972ce95bf610be543848c87d9cfd312552ff666660166f8108b46c8d70f7e875f40cd3f830aec57c79460b67e5509ac6194f530d78c348c325457796526ea4251d890f7e61b7a8786cae8abb9f3fa859269226c06180f", 0xcc, 0x984}], 0x80, &(0x7f0000000540)={[{@noload}, {@data_err_ignore}, {@data_writeback}, {@minixdf}, {@dioread_nolock}, {@delalloc}, {@grpid}], [{@smackfstransmute={'smackfstransmute', 0x3d, '*Y'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_appraise}, {@smackfsfloor={'smackfsfloor', 0x3d, '/[:[($/@%+%\':\xfc'}}, {@uid_lt={'uid<', 0xee00}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@subj_type}, {@subj_type}]}) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 19:10:47 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) r2 = dup3(r0, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0/file0\x00'}) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x6, 0x6, 0xad, 0x75, 0x0, 0x2, 0x20022, 0x10, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x10000, 0xb9dc, 0x5, 0x3, 0x9ce1, 0x9, 0x0, 0x0, 0xcef, 0x0, 0x7f}, 0x0, 0x10, r3, 0x2) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100), 0x101000, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x3, 0x0, 0xac, 0x0, 0x8, 0x48, 0xb, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_bp, 0x40010, 0xffffffffffffffc0, 0x10000000, 0x7, 0x8, 0x20, 0x5, 0x0, 0x5, 0x0, 0x9}, 0xffffffffffffffff, 0xf, r4, 0x975cd091850b1dde) 19:10:47 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:10:47 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1900}}, 0x24, 0x0) 19:10:47 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x42e2, 0x111) creat(&(0x7f0000000040)='./file0\x00', 0x0) 19:10:47 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x1800000000000000) 19:10:47 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) r2 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r6 = mmap$IORING_OFF_SQES(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x50, r0, 0x10000000) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r7, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r7, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r7, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x1, r8}}, 0x10001) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x1, 0x0, r7, 0x0, 0x0, 0x0, 0x2100, 0x0, {0x2, r8}}, 0x2) [ 1339.378553] loop2: detected capacity change from 0 to 4608 [ 1339.394697] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 19:10:47 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x8000000000000) 19:10:47 executing program 1: r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x402000, 0x102) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000480)={0x0, r0, 0x0, 0x10000, 0x0, 0x7}) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) openat(r1, &(0x7f0000000280)='./file0\x00', 0x2046a2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 19:10:47 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x2103000000000000) 19:10:47 executing program 6: perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x800, 0x4, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r1, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)={0x0, 0x0}) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000780)={0x3d8, 0x1f, 0x100, 0x70bd28, 0x25dfdbff, {0x6}, [@generic="04ff3257870cb953b864429fb9490fc62f52376e747cc6d44f9ad02be27eb2541bddf4b8e4ab44691871b4448238cf98c435f41377908cb65357e2689b3835df63c7eb1c66d5aeef1b000000000149af0e3f4661ad20d60c7e98dfe4c4b0fcbde6fdc4c28801ea0ef18690daec8820ab1d82ef9816f0de51759ca9", @nested={0x347, 0x67, 0x0, 0x1, [@typed={0x6, 0x7a, 0x0, 0x0, @str='+\x00'}, @typed={0x8, 0x40, 0x0, 0x0, @u32=0x4}, @typed={0x42, 0x58, 0x0, 0x0, @binary="619c0f692a41a65cd05bfce774a8f032470b603fcf620f783891d9a39545680cebbcbcbb66ac792b8630f8d7a73184117ec5ffb860972f4761ff0bfe7d83"}, @generic="ec1597ae38dd9be70dba699b223a7ad3d5078c97b9d67313c981dc78b0f56f21fb4a42ba3cca631af81ddfeb4abe431cea6b7ae4c83e4c9cc6c52c377c31e92031786b5887117114294f779bed599920b2957720177366f9ce986ff5ccb6c20d7349c27b1fc6bad0cf02738deac169fd6138d83fa77121fc3be1741ecf5568a3cbee0a6f3ddc640473ad718d778a5edf6562b9527bcd127228456b6eaace2246f0698c3557e8f19deba34426d51a9391bc9758", @typed={0xc1, 0x4b, 0x0, 0x0, @binary="bd18c6ec09b921880593e0476e2ed2c11de19772c3f7e7e03462cd0e6aaf0f2fac9ea524b930dc0826866098d731cfda3a876a30d4750ba37de76c1d08f9048fa2732ee8704835c074b30991aa42bcc920183e6f210c376a4e80d8a8c030352811c5ce37a5ba8557c0ef7eb0ca8cf5646d45126950df80f577d8b3ab4a453c55305e406535f165828c5bb74a1cb3ebee1ecb1e32a0c3f3becfce4837afc42a8e8931aa8e1bb5998345bfc983af6dcf760a2464a3a50185d94f79dca233"}, @typed={0xc, 0x86, 0x0, 0x0, @u64=0x2}, @typed={0x8, 0x17, 0x0, 0x0, @pid=r2}, @typed={0x161, 0x92, 0x0, 0x0, @str='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0'}]}]}, 0x3d8}, 0x1, 0x0, 0x0, 0x40}, 0x40000) r3 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) dup3(r0, r3, 0x0) [ 1339.474306] loop2: detected capacity change from 0 to 4608 19:10:47 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:10:47 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1901}}, 0x24, 0x0) [ 1339.501817] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 19:11:02 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x20000000000000) 19:11:02 executing program 3: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="0f4b8e590d1308245ad80fd8", 0xc}, {&(0x7f0000000040)="dd60fe7082e9e7", 0x7}, {&(0x7f0000000100)="99116c332ec0fedc403b824de449ac0bd285cd7ab51c564091826868de8d24e5ed75c417829b22d46d1818d3bef0cec0ee7cce2f0a272241268b6c90ba70d522e883cbecfd7bfd96c12affd198c2a92452cb889821dc0c6cd619dc139e9dd5ffadc7ac47dabb8163a6fa47aab4f59d0311109d9a4231cc97", 0x78}, {&(0x7f0000000080)="a731cfb8491f5b8afb", 0x9}, {&(0x7f0000000180)="27c917a36d96c1d077c9867d09c81af616cd7b1953fba025c538f5d6f96e3a2e7f958c6efce5f5540b7e271c44fc2a7b59e5ec22497876b43620e65bbc0c5a82fe8e5c0c1cd30cd5cbd40a1264288cf68172ca6b3860bcd856e5f4768d9ffcaa9075d90b7f1f8290972f0798dccbddead724250feccbfdf677657d31e7e259c6c98333a6388b84c6f619bb7491fe27e5da0aca8ccfb88492570ce6a9d2450800e74b376a", 0xa4}], 0x5) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x1, 0x1) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r1, r2, 0x0) 19:11:02 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1a00}}, 0x24, 0x0) 19:11:02 executing program 6: sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400d1}, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2000, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xff, 0x6, 0xff, 0x8, 0x0, 0x1f, 0x20031, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_config_ext={0x1, 0x1000}, 0x2388, 0x800, 0x3, 0x2, 0x883, 0x4, 0x1, 0x0, 0x1, 0x0, 0x81}, 0x0, 0x6, r0, 0x13) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) 19:11:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x402000, 0x102) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000480)={0x0, r1, 0x0, 0x10000, 0x0, 0x7}) openat(r1, &(0x7f0000000000)='./file0\x00', 0x101000, 0x29) creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 19:11:02 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x4000, 0xc, 0x16}, 0x18) execveat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000100)='-![-^@,%!\x00'], &(0x7f0000000400)=[&(0x7f0000000180)='#\'^*$%!]+/!\x00', &(0x7f00000001c0)='-.!\x7f-\x00', &(0x7f0000000200)=')b@[\x00', &(0x7f0000000240)='\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='#\x00', &(0x7f0000000340)='\\/h!%\x00', &(0x7f0000000380)='!\x00', &(0x7f00000003c0)='\\-\'\x00'], 0x1000) 19:11:02 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)="7e1e", 0x2}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:11:02 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x2400000000000000) 19:11:02 executing program 3: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="c83577e1e184db4eed4701616e4d2a07bebfe981a97b2b0b92964a7de2e685f1600de35afd52aafd71da007edff7c63f77f9f6eb56d3dfb7f632bbf4a1996cb86561d7c75717fd6217fe9616175438aca948b8298a6345b2f93887c72fc637fd2d10bf55097a9774343a60ba9dcb7a4b1632e18e04e265195f0e98491294de6856f9968e07af204ee636800ebbd14fe189918d04d5377cc0dcbb86519add3ca586712588d4e98ce3855714f3e0912e95cdd9b8e544ac2e63218bf00ccfc9ebd917e0f59f65b62070da09d604bfdb2888887ef6fb9e51a340fb6ff7af6c5e35252ce7632d", 0xe4}, {&(0x7f0000000200)="6aa40cf19630daaaf3c2e1e55d764c8b0b99ba5f4b7b7c28638148f421318bb75a87906c6498e630e117f6f675bd21c05d9bd290ae6c41d3f88174db3fc13afd947470236e63d05c4a09e2a8052f6a6ac3d12fcbce3fcd73946e8221192c7c5f4b48b1a29016891d37a562ddd45e1942fc33afc03f3a6a20c144ca24c496617c22c597d55dc6dd8ee34407cc41b8b074df1ee930febdaedc17e55963ad2676a86ec090dd519232ef6864033c3ab5d1c7c3bb7cf850858457cdeb51ab831aa2b29613d85bac17d3d3129ff5", 0xcb}], 0x2) dup3(r1, r2, 0x0) 19:11:02 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0xf0ffffffffffff) 19:11:02 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1a01}}, 0x24, 0x0) 19:11:02 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x17, 0x6, 0x4, 0x40, 0x0, 0x40, 0x10011, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000000), 0x7}, 0x8, 0x9, 0x401, 0xe, 0x14a6, 0x73b, 0xffe4, 0x0, 0x129, 0x0, 0x6dd98201}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x8) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) 19:11:02 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x5505000000000000) 19:11:02 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x2, 0x3, &(0x7f00000001c0)=[{&(0x7f00000000c0)="380ef44808a781955832fa78d7df878d8b1c3664108f867c771572f88d619a8b575bf15e0a1574e2e2532db6e063c56104d34ae5acaaea", 0x37, 0x2}, {&(0x7f0000000100)="c162ccdf51a0821461a733c9a650435da5bf6e34814739229776b72f306a74d87d99a6df65104871", 0x28, 0xffffffffffffffff}, {&(0x7f0000000140)="e791e2a5a92d01d1a0aa1bf0d60115fa3e4a080a9d7c24962bb0fdc957c6695bcf5bbf3269c8726f7774bcd0fa2bf82edd733a23d4ea4985cffb00aec71ca9bcc147db0168f644", 0x47}], 0x2008004, &(0x7f00000002c0)={[{@shortname_lower}, {@fat=@dos1xfloppy}, {@numtail}, {@shortname_win95}], [{@obj_role}, {@uid_lt={'uid<', 0xee00}}, {@permit_directio}]}) openat(r0, &(0x7f0000000240)='./file0\x00', 0x80800, 0x2) creat(&(0x7f0000000040)='./file0\x00', 0x0) 19:11:02 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:11:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r2, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000100)=0xca8c) preadv(r2, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) openat(r2, 0x0, 0x410202, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r3, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r3, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f00000000c0)=0x1000) 19:11:02 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 1354.667654] loop1: detected capacity change from 0 to 8388096 19:11:02 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x6400000000000000) 19:11:03 executing program 6: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x5, 0x7, 0x5, 0xb, 0x0, 0x400, 0x0, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x4, 0x6}, 0x0, 0x5, 0x6, 0x2, 0x1ff, 0x5, 0x4, 0x0, 0x3, 0x0, 0x9}, r2, 0x0, r1, 0xa) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) r3 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fdatasync(r0) dup3(r1, r3, 0x0) 19:11:03 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1b00}}, 0x24, 0x0) 19:11:18 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x100000000000000) 19:11:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x20000, 0x0) 19:11:18 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1b01}}, 0x24, 0x0) 19:11:19 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r2, 0x409, 0xe) fallocate(r2, 0x0, 0x0, 0x4) sendfile(r2, r0, 0x0, 0x0) 19:11:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) ioctl$FIOCLEX(r2, 0x5451) 19:11:19 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:11:19 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x8004000000000000) 19:11:19 executing program 3: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x1000) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x200, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xa, 0x10, r0, 0x44fd0000) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r4, r5, 0x1000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0x0, r5}}, './file0/file0\x00'}) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000100)=""/118, 0x76, 0x3, &(0x7f00000002c0)=@file={0x1, './file0/file0\x00'}, 0x6e) r6 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r1, r6, 0x0) 19:11:19 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1c00}}, 0x24, 0x0) 19:11:34 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1c01}}, 0x24, 0x0) 19:11:34 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)='~', 0x1}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:11:34 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000dc4f638a1492574e5c64095e19375dadfae4f7d658d8dbd9c5624c1156562455f55960fb6ef8ebc1689431c53d52e9b54eda61161ae1ce79caba5da41efc0d247866f23ac7a1fa67cd897830b557139f6af5efb63cd381d4c2149889f3f8ea00002acc8ec276ed44111ec2c4b080b87573363c111f5e9c75ff21a059301bbe9a5b56b3455984a1d940342405cb73c510c92bfe1621ddfd67d0e704dd53f001dd38f612ab36b7c7a6"]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000004c0)={0x0, 0x80, 0x8, 0x5, 0xe8, 0x83, 0x0, 0x6, 0x4a08, 0xc, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x8, 0x48a8}, 0x16810, 0x100, 0x800, 0x0, 0xffff, 0x8001, 0x0, 0x0, 0x3, 0x0, 0x800}) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x82, 0xff, 0x1, 0x8, 0x0, 0x3, 0x10000, 0x5, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x2023, 0x5, 0x1f, 0x8, 0x1000, 0x7fff, 0x2, 0x0, 0xa393, 0x0, 0x99}, 0x0, 0x9, r1, 0xa) r2 = memfd_create(&(0x7f0000000780)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3G\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8dt\x8e?;1;%\xba`\x19\x00\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu\xb1\xb3iy\xa4RWk\xb0\xf7\x1b\xaa\xe0\xe4\x82!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&\a5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0\xbf{&\xf2\xa0,\x16I\x14\x0f\xf0_\x97\xae\x12\xa6\xe9\x15\x9f\xb8~\x9d\f\x886\x9e\x7fv(;\x1f\x14\xe6\xcc\x91@\tq\xecF\xc4\x94F`\xdf\x88\xc7\x00\x00\x00\x00\x00', 0x7) dup3(r0, r2, 0x0) 19:11:34 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000dc4f638a1492574e5c64095e19375dadfae4f7d658d8dbd9c5624c1156562455f55960fb6ef8ebc1689431c53d52e9b54eda61161ae1ce79caba5da41efc0d247866f23ac7a1fa67cd897830b557139f6af5efb63cd381d4c2149889f3f8ea00002acc8ec276ed44111ec2a7b080b87573363c111f5e9c75b7232993ef8bf9d15b56b3455984a1d940342405cbf3c500c92bfe1621ddfd67d0e704dd53f001dd38f612ab36b7c7a6"]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000004c0)={0x0, 0x80, 0x8, 0x5, 0xe8, 0x83, 0x0, 0x6, 0x4a08, 0xc, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x8, 0x48a8}, 0x16810, 0x100, 0x800, 0x0, 0xffff, 0x8001, 0x0, 0x0, 0x3, 0x0, 0x800}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000100)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0') dup3(r0, r1, 0x0) pread64(r1, &(0x7f0000000000)=""/55, 0x37, 0x1) 19:11:34 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x8cffffff00000000) 19:11:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x9, 0x4000010, r0, 0xf6c80000) creat(&(0x7f0000000040)='./file0\x00', 0x0) 19:11:34 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x200000000000000) 19:11:34 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r0, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r0, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x105be0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) syz_io_uring_submit(r6, r5, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r5, &(0x7f0000000080)=@IORING_OP_LINK_TIMEOUT={0xf, 0x3, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x1, 0x0, 0x1, {0x0, r7}}, 0x3) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(0xffffffffffffffff, &(0x7f0000001580)=[{&(0x7f0000002600)=""/4088, 0xff8}], 0x1, 0x5, 0x0) r8 = fork() ptrace$setopts(0x4206, r8, 0x10001, 0x3d) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)=r8) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 19:11:34 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:11:34 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xa1ffffff00000000) 19:11:34 executing program 3: r0 = fork() ptrace$setopts(0x4206, r0, 0x10001, 0x3d) r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x7d, 0x0, 0x7, 0x0, 0x20, 0x80400, 0xb, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x5}, 0x8210, 0x1, 0xd2d, 0x5, 0x1, 0x8, 0x6, 0x0, 0x80000000, 0x0, 0x1272}, 0xffffffffffffffff, 0xe, r1, 0x1) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r2, r3, 0x0) 19:11:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x8080, 0x8) 19:11:34 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1d00}}, 0x24, 0x0) 19:11:34 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x300000000000000) 19:11:34 executing program 6: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd_index=0x5, 0x10000, {0x0, r0}, 0x401, 0x9, 0x0, {0x0, 0x0, r0}}, 0x5b) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) r3 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r3, 0x409, 0xe) fallocate(r3, 0x0, 0x0, 0x4) dup2(r0, r3) dup3(r1, r2, 0x0) 19:11:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x4c400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x4, 0x6, 0x3}) 19:11:34 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:11:34 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xbd8f62caaf000000) 19:11:34 executing program 3: perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x72, 0x0, 0x26, 0xff, 0x0, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) 19:11:34 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x400000000000000) 19:11:48 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x500000000000000) 19:11:48 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1d01}}, 0x24, 0x0) 19:11:48 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x58, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:11:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x4d40, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 19:11:48 executing program 1: r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x402000, 0x102) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000480)={0x0, r0, 0x0, 0x10000, 0x0, 0x7}) openat(r0, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x20080, 0x0) read(r1, &(0x7f0000000080)=""/123, 0x7b) 19:11:48 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4020c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x60da, &(0x7f0000000240)={0x0, 0x34a0, 0x1, 0x3, 0x230}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r0, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r0, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x64, 0x3, 0x4, 0x8, 0x0, 0x30a, 0x8800, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x49008, 0x40, 0x8, 0x4, 0x4, 0x1ff, 0x9, 0x0, 0x800, 0x0, 0x10001}, 0x0, 0x9, r0, 0x0) sendmmsg$inet6(r0, &(0x7f0000005100)=[{{&(0x7f0000000340)={0xa, 0x4e21, 0x8001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}, 0x1c, &(0x7f0000000a00)=[{&(0x7f0000000380)="bea161a6adf970368c2dd7c6df158c45061e74d26ff886938a7ee121b43948ca55c089b2e012f3cdc1565b1509911173740d12572eb8bb45e69ba6039842b60fdd53cbaddb97f29c8adf5b82c7ca", 0x4e}, {&(0x7f0000002600)="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", 0x1000}, {&(0x7f0000000400)="f70f6920edc3c30d885581d3be90268dd9580bbd256690cdccab338e6d4e0798773544060577852f3ab352fc0540", 0x2e}, {&(0x7f00000004c0)="c34e114e4d0115b235743f65c096a9f24a09132be1b31acf14ac5c241c76a1374f6b09030b3ef8752af822d09023d2a4c4471271160be20779045d59f4ebdfab5ed8937d0306337837b67ad58a8d86e20c3ad30bff337fa044988528", 0x5c}, {&(0x7f0000000540)="8e19c0deff77845c56132f64d22b82db66a598991e11d1533ff8adb4d9e97f3d403ea575f9c40b27fb8517eeef42a571dc11926e49c942550ffc", 0x3a}, {&(0x7f00000053c0)="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", 0x16e}, {&(0x7f0000000840)="ca1df93a14988424c829524b2c4acd48eef4b4dd9caab81633af0e0afa94006d18ee484930f5ce25bfa29d811bd95ab77c16350369dc680871ea02559d1757bb4a7dcbd4d6908e00e93b0bdfd99931f1984d389403225c78f15a073bae2a8d8cda20027cbfc9ef2213f92467013cc8fc553f5690624d35227249973b47e241fbf56271d82507b2919cf1", 0x8a}, {&(0x7f0000003600)="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", 0x1000}, {&(0x7f0000000900)="f617353af3977cd74572ec276ac03e3b959f5277bf5483b2c7a3f4c1a592c056f027bb15212fd1d23d03a75347869e3d22a4a6ccdb243429986107efeabd3a5a988e7e84a4e3a45f6272fa9b8f826fc65276470975717c0952d1154b7ab3c26348d85e22f8af1c03f34c0b6b65a757755baa135cf4cb7b4a12213dc33daaf6b4512955fb03b77753aff9a641911db5c8cb78d0c25506ef586b5bac49def520d3cf231e6dd08d7dd7e0e3e5adb00a07e8de6b334e1f97bad67b8006ee982bdaa499336f6bf780", 0xc6}, {&(0x7f0000000580)="864265ec0c6b01613a6c", 0xa}], 0xa, &(0x7f00000005c0)=[@hoplimit={{0x14, 0x29, 0x34, 0x1}}], 0x18}}, {{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000ac0)="a9e49264032090c6c344e5a0e8687723f45a152f623ea1113994c81396cd6ccb139f5f171007fd8b145296a6d02216dfeb81b85cb928258bdec0dee55d28eebdbd9427800c12a3b9046af2df8d7acc0b10f7a9b1f486c14ba149572eb1bc9ac794864035861b5af6be24d0ce33938d3bb8a678bb5a14d8", 0x77}, {&(0x7f0000000b40)="b9bc44b0efd42b13cc5c02cb8d9a9298ba1d71d0f2b4f0147d7a13625f2b92cb9618738313db97316eba7ed12f996465ae6749192704a7204da56149342d1f25b1c56869d44b76b9ccd6113b8ade3d462f7b71c422da35a9bbcc5bd0b46eb96bf4f26a1b98e4389c4fbfb74fb2a95ff6ed289311f730b9", 0x77}, {&(0x7f0000000bc0)="153b5d8b3a8ac4fa42109259bcec368a463a6324c9e265ff3e524e602f40be490bdcedc5b742f6c3dfc4a40a9eb007a8ce9b463267373f8d985022ec23b2d3598867cd814225532d3baa799efed19dbdbdd0aa05505ebcefd91c0a4eea4cb9788824f9358fdd8b7b8e2fcc359cec4ab70ed74839531833f8f711d7566201f3e658d521c98db9d86f21fa8aa571f29a0f38315a4b9b2fe27afb80468e26a2d321e0b493308f533e4dddc8c11a6f0535ad4be5a062d3e5121db7b1a5b881630d92efa86990a0534f6ba2a3b2b6832bc4304ac0", 0xd2}, {&(0x7f0000000cc0)="bab534352fbc4a93802f3d531a8d5bf489c1e23ed50cfb3957a26ae95ec3017924d19c4ae07743", 0x27}], 0x4}}, {{&(0x7f0000000d40)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, 0x5}, 0x1c, &(0x7f0000000d80)}}, {{&(0x7f0000000dc0)={0xa, 0x4e22, 0x3, @mcast1, 0x2}, 0x1c, &(0x7f0000001100)=[{&(0x7f0000000e00)="ab64f300cac8a30f3eedcf9f62a417c73956cf6a683de9555c8faa5342317154c4a8115f993d0bb40aed525cdd24013871c3873d9b3d93b4327db1bc9919ebbd79757e73e40552c08fb21badf6afe981ce1b2bcac663dceaf6c21804ed5660361c235fa89137d975272a4f53385dbd380b791540a2e93d03234e23df33836e989b8133ccc8aad3d11118b62a330d3041ac2b13c3d952783a3ec19893ad499f28b5712183ff2fdf6a5dfbe71e45226fb41ee177fae42403e75e5fdc3109e0b51ff4aea632b33189fd0fb6d1b5cc498a55cc", 0xd1}, {&(0x7f0000000f00)="1f5dbb0e74664f10ec6b9ac539958a7db0464d0a40d459f0137f960a7ce341844b835652c4f6555378047de304008e321f42ed571c3a6a6c1b7b51763ca0575e1c63acdb", 0x44}, {&(0x7f0000000f80)="86ee154e77bd277e637c5f6ea2e16e62c08ea0bdabde88a253702c97c7a0417898964049cb1bd6c2c590ea9ec3f4f0c6bd9986dfa20070385d388810f170975aea483ce251b80da9c41ae84fff9dc91ba06bbbd7a35b6f519b520ad5d846c4e70c23e2620d96c868ef5cad382850dcc6ab042db9fe7526fcc1fb95df70bd5bd0c5027b47835adf230bd5b1a8da3b32a7f169cf132ce18de0427d89d5505df70b1f509f6d0be3005b727a2bb32a", 0xad}, {&(0x7f0000001040)="bce69c11457332fb84fb744bf80345631d9b6cac5e3bdf2cf4f5c5153c7281f83eb856fb3a1989012c2163fcd0360505a3b1bf26bec5321776b307cee9d2f433a96e0660716dc5e2cd072c3d26aebea553cbdf7cca9a0e3ca13e93a6a4703da7e8874fea359af1be9dabdf80f5577038ac297af7ef27fa6a515e4b37c146e17e", 0x80}, {&(0x7f00000010c0)="fe1adedb32e2d7b25c1e60053c8da056578a07f3710325db984edf4036bd8f5f041ca788771202043eab8f481c5ed2dd0f9b4b6dcfead95ebee0c59821", 0x3d}], 0x5, &(0x7f0000001180)=[@dontfrag={{0x14, 0x29, 0x3e, 0x2}}, @flowinfo={{0x14, 0x29, 0xb, 0x9}}, @flowinfo={{0x14, 0x29, 0xb, 0x4}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x87, 0x4, 0x2, 0x40, 0x0, [@empty, @private0={0xfc, 0x0, '\x00', 0x1}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x1}}, @hopopts={{0x180, 0x29, 0x36, {0x1b3, 0x2c, '\x00', [@generic={0x7, 0xb4, "405434acc6a6fec42ece455c11ba70962accae58894fa306466e0054fe0b15a688587eb1ab3b0d005c00cd5acb1d244ac62173449f3c2dfc9bb7ef2c49ae253d8a2326541f14f896fe90294ddc8073719d553449dad7535cfff9a21b0abf4d9353221524cb256f6fe4f8e9c1c9b1614b2bc08573d3687eb6d5b49efcb89c34f7f7b521031a6d0e5124c4097958ca715809f2cd942a5e518e66d2b644db8cc625d3ddd7c24326ebf47270a61f1af108abfe8f89ee"}, @jumbo={0xc2, 0x4, 0x1}, @generic={0x7, 0x7a, "f036aa93e395eecbb4565b6bbf32e6a491eca4ac50d269d73fc7067cc35103573db523494bc4d3beb03968b9f5a2501f6d629fa1dd897c502f45c162b86e26df1a6e42ede89dab94e07fb33f5914e2fa53aad2c368f9590e3e03b7e17f731271500838ad5a78b7ef493c86a5fc7e759b84603f8c7e8a8931502a"}, @pad1, @hao={0xc9, 0x10, @mcast2}, @pad1, @jumbo={0xc2, 0x4, 0x5}, @enc_lim={0x4, 0x1, 0x4}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @pad1]}}}], 0x218}}, {{&(0x7f00000013c0)={0xa, 0x4e22, 0x0, @loopback, 0x7}, 0x1c, &(0x7f0000004600)=[{&(0x7f0000001400)="07cc48221436159d03fe06ea4f5c2eaecc5290d2e1c920c6ce55120b527e4aa6eadf32bda49e70f0eb", 0x29}, {&(0x7f00000052c0)="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", 0xfd}, {&(0x7f0000001540)="7f971d87d3e77be9add1e71e1529cfc723ac46a2c29339a6a8b0c638ab6fbb926ccf983ff5c4ff89c42981e6ce17c9718ae2de96", 0x34}], 0x3, &(0x7f0000004640)=[@pktinfo={{0x24, 0x29, 0x32, {@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}], 0x28}}, {{&(0x7f0000004680)={0xa, 0x4e23, 0xe8c, @ipv4={'\x00', '\xff\xff', @multicast2}, 0xfffffffe}, 0x1c, &(0x7f0000004c40)=[{&(0x7f00000046c0)="32a31748634602abce630e2f88cab70a298fcdbd6f3185328a2f1556084edfa890afa3270d9b5333109b2d6383775e7e6fdde0e042635af1417f86c395bbd274ee3e0e07877684dea011ac4c9cc5aa38d9a66b88da8cf69f85608b64b7dd6b767ffe7b4911ceef2d8f0b409a9b30f09e3923a4a040d6d99a818361a5b3b91af3a87f38d601545e7c6676e9392b95daea1a46c403005ff0d91d321f22e3c84094e84657e0e1cb8d6b7b5e025061d7dc18377b0fcacc2730b18a21036b30bd33623bb59d8330d54206d5ba4d0546dcf99f0c3ee714bfdac785e4d50119ceb990abe8b3458959dc7afd0403aa1c70f50f3cf89902ba719a3a", 0xf7}, {&(0x7f00000047c0)="968045a5d1ab7636adfd6909fc3ffe0a288810be75c2f7c2c5", 0x19}, {&(0x7f0000004800)="c785201dd8cc43f97ebacec162bf236dc1d7d0bc540bd5b9376ee8af3bf25a7adcf564799032f752893bf32a252bc956bff3eaa109c4f32e9be72465ec112da67dc218f2c2b5c081034594276e7cf31b0e7bb74ddfeb1f70adda0336e6b77a06add255799f824e86bd38904eb1b19fc558263aa08830d47b568798d8c7e85462301e255ad5f9c01b24bc", 0x8a}, {&(0x7f00000048c0)="1891e7efad14627b9beeb86ab592e028e00eada22a8535dfc3fe1227631143da67f0274e9f2f358212b360fdb8410378ee2acabc46dc9d96daa7839bc6ad1ff50a7df4fa7a2f6a336a1ad6224c789744e5c5ed1a6516203829b38e7ce3247483af8c58b950ff1ee0ba2d8b47933faf", 0x6f}, {&(0x7f0000004940)="3041a7afba9d9557a8fe6b86f64c8a4e4170969dea8e63ae218fa12c77511f73521db2769aafff7427d29eb3fe82653c4483528e8c98a73aa68daa6a8ea977f00b368de4ecf35f974d26ce8a3bad4f572f514c2526224a7f788c2dd461e5ddae784d98aacca4e83aff183d89a75df452cd39bd6d82dc23faac042d16712ff315fab699a6c1641deba6ef45c6a7df4e5ed841d030d2a772be6a54fe62ed6d4aa48887750da0c63279592feab40d", 0xad}, {&(0x7f0000004a00)="feda3236c6d07bf4eeb16086b5e31b3dcac2d02391db36cbce53a6387ad97942884722bcc5d6c26f816eb60c7222f66a6dce18ac4f8d16335a6b0b92cf7725b0525995c31870990090a7b45e343e4fd6bc0a43720289107761ed8349dc330c2af0361762fdbfe37151470aa96e0a0b6416c6546c9e035c1c3fcd78547101aafcee5021b620b620f48463cb37b5b9f4ff771bd26b250dde4c0c5204e0178b1280ec4b35980d74041e0c0f1e904f60", 0xae}, {&(0x7f0000004ac0)="b47269fef36544fd325bee3721084b6f501d55ffd879a1716d01ecc599b76f", 0x1f}, {&(0x7f0000004b00)="37feb4d47583e7f7573c9df94ad5eda03aaf86574c878d13aab2b80cf4dc9a5ac3f38767f4c2b0e825d06a6165b3033ec3ed8ce6a3273332209bc5a43f5cd030abd5481e01b12742af386783e096f1fc70abc1afb12155ec7eff632ddc73a76c7d92bf97de943df09a7c8ab4de5a1be37a28eb7bce9e10feecbab086d2537cdecba3dc6eac28f3b8f7399b2f76255b3a78f4153d70751a2f86c2cb5dd7", 0x9d}, {&(0x7f0000004bc0)="b4f8d767670d17f4299f7988005e90f6bf9f09", 0x13}, {&(0x7f0000004c00)="8b460f9957c69817536642ee4a6aae7168883fba65464db8c71af14cdf3a69949f91b4bd6c3942c293fbef36a2ccac1c789614dcd9afae4ab6525cf861a187", 0x3f}], 0xa, &(0x7f0000001440)=ANY=[@ANYBLOB="300000000000000029000000040000008902000000000000c910200100000000000000000000000000000000000020000000000000000900000004000000040000000000000004010100000000007615d92d7f91fc687ef85431a8b858dd5dc85813c391e90832fde7462cc08752651aaa17fe56e55a4f9d57619db61494b2a97736f726078ab1e34c2fb37517ed927e4e7bd22a8a0149fd0b780209dd4e4f74cfd00444544b95ead370c451c5aa8026e9c4083474df9cf627a19641820966831beb81d6f5caa00286298f4a7825d69749b7b4fb77cfd651a47b036d954960572dafb11dc5cb848c87196f65b42ead8c00"/251], 0x50}}, {{&(0x7f0000004d80)={0xa, 0x4e22, 0x101, @remote, 0x10000}, 0x1c, &(0x7f0000004f80)=[{&(0x7f0000004dc0)="5802103b4529c080e53d06e080f0854a0aae18d9b24bae0b67d5c6e6bc64bdda7d8f177178193eb288f943cb05de3db3de2c7d7e972f97bed4c9ad56a0671c945d4dc1051d44d83f24057e023292a0", 0x4f}, {&(0x7f0000004e40)="2e3d65d02883415a65d4fd88c50c16f35e85ad85b3a59c1ed05d5d897a6edb54d9fa38f57fcb542ae00bc41b52aa5f3b0de61f09f2d88bbb47e8d5c424664c96e3f5ce773d464cb53c799e4a1d1687bf0819f1ad177fb2884afa5625c6bc7e093c0257fb391d7b5c579c5717e96ee7ca972979daf6f8af19131df42621051fe83ec5759e22f160547de1544cf3d0d3ea5383ac89d7e66e24f3d2043f47d6b964294d17c5ec7537aef2fbcd080e681113347950b6fbdf01322d2ab591e568b0c5dc2ff0b892be74", 0xc7}, {&(0x7f0000004f40)="12dbdfbc", 0x4}], 0x3, &(0x7f0000004fc0)=[@tclass={{0x14, 0x29, 0x43, 0x5}}, @hopopts={{0x28, 0x29, 0x36, {0x0, 0x1, '\x00', [@ra={0x5, 0x2, 0x8}, @jumbo={0xc2, 0x4, 0x2}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@loopback}}}, @tclass={{0x14, 0x29, 0x43, 0x2}}, @tclass={{0x14, 0x29, 0x43, 0x1}}, @rthdr_2292={{0x78, 0x29, 0x39, {0x3c, 0xc, 0x1, 0x49, 0x0, [@rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00', @private2={0xfc, 0x2, '\x00', 0x1}, @local, @private0={0xfc, 0x0, '\x00', 0x1}]}}}], 0x110}}], 0x7, 0x8040) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) r3 = dup3(r1, r2, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000100)={0x0, 0x0, 0x2, 0x0, '\x00', [{0x9, 0x1, 0x9, 0x100000001, 0x1, 0x9}, {0x1, 0x7fffffff, 0x5, 0x5, 0x2, 0x8}], ['\x00', '\x00']}) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) lseek(r4, 0x2, 0x3) 19:11:48 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xe4ffffff00000000) 19:11:48 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder-control\x00', 0x0, 0x0) fallocate(r0, 0x10, 0xffffffff, 0x1) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8000000000000000, 0x40000000000004}, 0x8422}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0xe) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0/file0\x00'}) r4 = dup(r3) r5 = syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r6, &(0x7f0000001480)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001440)={&(0x7f0000001400)={0x40, r5, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xff}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x40000) r7 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r7, 0x409, 0xe) fallocate(r7, 0x0, 0x0, 0x4) dup2(r7, r0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r4, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x3c, r5, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x3}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x9}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x82}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x40}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000800) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="002828bd7000fddbdf250a00000005002d000000000005002a0000000000"], 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x20044051) dup3(r1, r2, 0x0) 19:11:48 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)='~', 0x1}], 0x0, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:11:48 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xf6ffffff00000000) 19:11:48 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x600000000000000) 19:11:48 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1e00}}, 0x24, 0x0) 19:12:04 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x700000000000000) 19:12:04 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xfbffffff00000000) 19:12:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x6e2, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0xa1) fallocate(r0, 0x20, 0x8001, 0x9) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) creat(&(0x7f0000000080)='./file0\x00', 0xe1) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 19:12:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2d54}}, './file0\x00'}) dup2(r1, r0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x200, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r3, r4, 0x1000) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x200, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r5, r6, 0x1000) syz_mount_image$iso9660(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x3, 0x1, &(0x7f0000000200)=[{&(0x7f0000000180)="d8bf3fc2decbbcfc3681a057e3d69c9dfc98b6a06bec5ce12f173f6d93813382908efe75b0fb226303c15cc6cb852215ab7a9dcce88230e97665d240893b33a2d7cf4357f46c05", 0x47, 0xda29}], 0x100000, &(0x7f00000002c0)={[{@gid}, {@gid={'gid', 0x3d, r4}}], [{@permit_directio}, {@euid_gt}, {@appraise_type}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@euid_gt={'euid>', r5}}]}) openat(r2, &(0x7f0000000080)='./file0\x00', 0x210801, 0x110) creat(&(0x7f0000000040)='./file0\x00', 0x0) 19:12:04 executing program 6: perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) memfd_create(&(0x7f0000000000)='([\\#(\x83\xe7,{\x00', 0xc) dup3(r0, r1, 0x0) 19:12:04 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fsync(r0) dup3(r0, r1, 0x0) 19:12:04 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1e01}}, 0x24, 0x0) 19:12:04 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)='~', 0x1}], 0x0, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 1416.021216] loop1: detected capacity change from 0 to 111616 [ 1416.047364] loop1: detected capacity change from 0 to 111616 19:12:04 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xfeffffff00000000) 19:12:04 executing program 5: syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)='~', 0x1}], 0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:12:04 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x22a1, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 19:12:04 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x800000000000000) 19:12:04 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1f00}}, 0x24, 0x0) 19:12:04 executing program 6: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$FIGETBSZ(r3, 0x2, &(0x7f0000000040)) dup3(r1, r2, 0x0) 19:12:04 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x100) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) 19:12:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0xe400, 0x1) quotactl(0x1, &(0x7f0000000000)='./file0/file0\x00', 0xee00, &(0x7f0000000080)="75601223d2d5c32c1bf4e68303e394da2cb9424292c7378b9dded14c17d0de00ebb22faede8c132f4a08e83e9018018ce2cee4604d10c6e0553a8334ce3f891894959a2c31428f03b30ed6888c8cbccf87bc1c84495249d2de0cfbbb0608ce95932589ae740dd8b36115f67f4b1ab35caf6bd7e606dcf88ecef65c8d54df25d57ad66d38eb3676f12d") write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 19:12:04 executing program 5: syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)='~', 0x1}], 0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:12:04 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xffffff7f00000000) 19:12:04 executing program 6: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x4, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x46230, 0x0, 0x0, 0x647a62a8750370d6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x4001, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = dup2(r3, r2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000200)=ANY=[]) lseek(r4, 0x7, 0x0) setxattr$trusted_overlay_redirect(0x0, &(0x7f00000003c0), 0x0, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x43}) creat(0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000600)={0x1, 0x0, 0x7fffffff}) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xa001, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) dup3(r1, r0, 0x80000) 19:12:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r1, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000640)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd=r0, 0x2, 0x0, 0x3ff, 0x0, 0x1}, 0x7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000600)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@un=@abs={0x1, 0x0, 0x4e23}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="431cd535361d15ff451fd1e72fed58eb06c323a3a863ad046257df07ccb5b687287e4cab78492fd084aed5415f88806269e27234fa6ed8ab169931b663a5e032f9a9612141ac455f71670692c1db31e97e24b9533d4fcfeb6abcc08ea1da7f1439fa66f5f532d3dc87affc8fbebbff9bdc4b3647417c6ffdc0d57f190c062cf77f6eba34ea5a46997ab1fab56b3001fdd6d808b7f25a", 0x96}, {&(0x7f00000001c0)="2dfae28ebc4c0c6b1a19f329870dd27ce90b3cb1aa40b2c2d9c9d1a312cfd116f1854493f33b108e855390e688c56a6fae11e1ea3d0947da95158de635b249c3bd527a523177373c82873fd597e7817afcda8d1cb7d720c77ec6705cad458bafbc6615441c1bb9", 0x67}, {&(0x7f00000002c0)="cd43caa0c8029c783df2af842927c4b9b77aaab823243e4277973ebf34d8aec2c45a4087e1e6af278f26aebd2e7038068be37ef3b34c6b7923638ef1d64727faabc043965c5cf0c7ca384cfe8fdfa2f2f34c2af3bada5a1784073fb60828f60f2ef0f962e94c403e1599ae8c24d12bb32dece8a55bf3adef20468547c479bca8d8825b7726054b862a497925e63aa942dce005db14a925be1b28a34b60fb75b1ff8c5cec565b55f2cadfa6efb52ac2a34aeb60a5248fe2cca52b6cf4430f4163c81f4963561060", 0xc7}], 0x3, &(0x7f00000003c0)=[{0x40, 0x88, 0x6, "f8c8186597c8bc837ab208d736d4db5cf5ad70013ac1f40f05e285545403f4405eeafb6b2c043fcb6f33"}, {0x100, 0x10e, 0x5e0a735e, "1cf313783cb1839a861f6ff915422b3e7eda2ffdc6234517cd88aa7d5c8dcdaab2d965805783680d5ef98b44d0e2565d5da10f37bb33cb2706d50527c06d7f365818fde4696dbfedbc97cdb188c1b9e342abb5d82910622a38daab4246715f2abccb4c9ab8929efec4402b480bcb4f35b4a31dd72c761bb82a09c8ee4fa9c6e8b1a7ecf1a2475a068ebf3602e9d02aab1f909cca848925644c7cb0b87ff7598dc985b4c8ef4e5b4857131ce493a45eba28b091b8987dbf3c2dd38c728a612b07d18f4589a4448f46232c9079c627de7a5fb5c3dda1a56198a4aac3cdd0c7cab95a53bac0ca9180f1c422a85390"}, {0xd0, 0x108, 0x0, "47f5381cd745f28d48fc1990475835ca12e4d91e0d9b457ba146a45ec577ed09343051e4534b721914efbde3fcd68fda8adb24d08d0405e73561a555ee6be9885ad4186087ba7625dc687f93697957d6c33b1b6cdc883806c2e0cb27330d87ef59100aa33745e30a06656c53d3c8854f761c23d9843094036b8e10f5f91a7fe57468ba6eb9897ea6eca9a9bbaa6acf059682ec52de9b9d2fd9a198b2e5ddb7627f86013b35ceb98bc2838f17af7ce03fa79335bfbead61b5c095e3b9e9"}], 0x210}, 0x0, 0x48451}, 0x5) [ 1416.563164] loop6: detected capacity change from 0 to 33559040 19:12:19 executing program 3: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x20, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d6}, 0x0, 0x1, 0xffffffffffffffff, 0x0) write$P9_RLERROR(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x7) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r1, r2, 0x0) 19:12:19 executing program 6: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) r3 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r3, 0x409, 0xe) r4 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r4, 0x409, 0xe) fallocate(r4, 0x0, 0x0, 0x4) dup2(r0, r4) fallocate(r3, 0x0, 0x0, 0x4) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [], 0xa, "bd319f6233aab47faecd5396581f0fc6854dfba834553f18e1f9fb2627b07fa2887bf9101c368b2217ba6213621160ebc0ab6460dda5aee89d39bb7b0c7e73d06b8a2e9d851ef1733e3c9e574737eb29b7a056d35443323ef91ad595aef464cd2939f4b46f59a06eed76a58d"}, 0x77) dup3(r1, r2, 0x0) 19:12:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pidfd_getfd(r1, r1, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r2, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r2, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000100)={{{@in=@multicast2, @in6=@private1}}, {{@in6=@mcast1}, 0x0, @in6=@empty}}, &(0x7f0000000200)=0xe8) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x20100, 0x0) copy_file_range(r3, &(0x7f0000000080)=0xfffffffffffff800, r0, &(0x7f00000000c0)=0x1, 0x4, 0x0) 19:12:19 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r0, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r0, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x846e2, 0x15) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 19:12:19 executing program 5: syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)='~', 0x1}], 0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) 19:12:19 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xffffffff00000000) 19:12:19 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x804000000000000) 19:12:19 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x1f01}}, 0x24, 0x0) 19:12:20 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)='~', 0x1}], 0x0, 0x0) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:12:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) openat(0xffffffffffffff9c, 0x0, 0x430d00, 0x82) socket$unix(0x1, 0x2, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0xf07fb667c2a1abb8, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 19:12:20 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x2000}}, 0x24, 0x0) 19:12:20 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0xfffffffffffff000) 19:12:20 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(r0, r1, 0x0) 19:12:20 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x1000000000000000) 19:12:20 executing program 6: sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c000000d140743788de64fa77bf1407ffc2feadf3f18269bae413d015dbf5fe00c9f2180d48687f6e0efef7ea2ac38f5a49bf3f04d10748b26571885e94ce73d03d07000000c6cebdff995b1d186dfb9fbbe64cf9791dc8ea4044589d2b8f06b23f26a8c841b780161d568e7e797b8d69285296ef41436a63d689e412d2b06b6bd9b95cd82dc7b6f6403a3ff7bd7a5cc63ad68627749587229c60e9a896023c65c1cb277bc5e8655bc5a6c6455131eefbb9943c175e0fa66fc243dfc7c05e6c712fd55f198bd9668f6229f4645b74654d8f848abec6cb8f1cf5c703070d", @ANYRES16=0x0, @ANYBLOB="000329bd7000ffdbdf25060000000c000380050008000600000054000380080001000000000005000800c000000014000600ff02000000000000000000000000000114000600fe8800000000000000000000000000010800030003000000080001000300000008000500ffffffff0800040009000000"], 0x7c}, 0x1, 0x0, 0x0, 0x4004830}, 0x810) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r1, r2, 0x0) r3 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r3, 0x409, 0xe) fallocate(r3, 0x0, 0x0, 0x4) r4 = dup3(r0, r0, 0x80000) close_range(r4, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000000)=ANY=[@ANYBLOB="0800000000000000000000c7e56b7265"]) 19:12:20 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x4) creat(&(0x7f0000000040)='./file0\x00', 0x0) 19:12:35 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) 19:12:35 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)='~', 0x1}], 0x0, 0x0) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:12:35 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x0, 0x81, 0x20, 0x0, 0x6, 0x4880, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000000), 0x9}, 0x104, 0xffff, 0x5, 0x9, 0xffffffffffff2e71, 0x4, 0x4fb, 0x0, 0x7f, 0x0, 0x8}, 0x0, 0x7, 0xffffffffffffffff, 0x2) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) r2 = fork() wait4(r2, &(0x7f0000000100), 0x1000000, &(0x7f0000000000)) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x5d, 0x40, 0x0, 0x8f, 0x0, 0x8, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x4, @perf_config_ext={0x0, 0x9}, 0x400, 0x298800000, 0x2, 0x9, 0x2fc, 0x7, 0x68f9, 0x0, 0x1, 0x0, 0x8}, r2, 0x10, 0xffffffffffffffff, 0x2) dup3(r0, r1, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x2c800, 0x0) 19:12:35 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x1201000000000000) 19:12:35 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x2001}}, 0x24, 0x0) 19:12:35 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x2c842, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.events.local\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r2, 0x409, 0xe) fallocate(r2, 0x0, 0x0, 0x4) r3 = signalfd(r0, &(0x7f0000000740)={[0x1]}, 0x8) sendfile(r2, r3, &(0x7f0000000780)=0x5, 0x1) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) r5 = fork() wait4(r5, &(0x7f0000000100), 0x1000000, &(0x7f0000000000)) sendmsg$nl_generic(r4, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x27c, 0x3a, 0x10, 0x70bd25, 0x25dfdbfb, {0x5}, [@generic="761aa4019629fa5a5ee5da2992134d2e63b047b82dee26d33d72cef9d8497381aa28c481dd591a8bc692c912951c9b0c1424d5596c2ec4b1b3ac65216c051761a40e52d2dd0cbc1f887e28a621471c507ced870865e169210c17d426d82dfc3ac866cc5b53", @generic="64c6748d8fb4cc776012f5def55bd486a1590b784cd4a6909a10f22ea3f6a67ab3612f0dbeecf43db213286acb4ae1465ddf7c01fc53b485010506251a153a9a00e05f597be30627dd905299ff34119ed71ffaccf236533229f5475f1dcc5a", @nested={0x122, 0x77, 0x0, 0x1, [@generic="679b0efe29c432525f193892ee63862c8c9a2b194855dccc25ecfc", @generic="33746c85eefb010beb07915a485e4fd9d479af2e462632de07322f17ef202ddf15c8d218f7e04e8b997cd563de35cdfc4d58c813cd8efccd68e7fb6aefc4c1f402d2643ba6a1bf193e7a680d510e474251d7c4d1105d3d05e8b627931d7064f4052cdb47792d1d2ad321b0ef11aa2082d988f7d0d2167bc603e32f826530e3ee26546f947922e27bbf2d8f944699d5fbb533b5de8177e0468aff56db1348c53ba4906f00dd271a1c3447a12fe874ab0073e5d0d1c154e87161c2ae5a496a81", @generic="f25a6ee7ca76b18b84c4", @generic="e431559f1575129462cdd38984f1aee0148559842f7d729e3edcfe6fff42f30e9ef062d64851196569cb530b5b9a3c3bf7889c9b02026a10f413"]}, @generic="1aa4233cc93b36a0484867b31223c2ad2150b4ef0d160e407eb8ef0190b66fd2cafcbabca2c9de6185f03f2bba6d7bba182d8e267b7b211607dd36ea6c747317dfa33b096b6e05e1c8003309add20a7b14414751f36ea247e384a8371af993", @nested={0xc, 0x32, 0x0, 0x1, [@typed={0x8, 0x7f, 0x0, 0x0, @pid=r5}]}, @typed={0x14, 0x15, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x2c}}]}, 0x27c}, 0x1, 0x0, 0x0, 0x24040001}, 0x0) fcntl$dupfd(r0, 0x406, r1) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000000640)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000600)={&(0x7f0000000440)={0x1a0, 0x1, 0x2, 0x401, 0x0, 0x0, {0x1, 0x0, 0x9}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x2}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x80000001}, @CTA_EXPECT_NAT={0x104, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_TUPLE={0x68, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @CTA_EXPECT_NAT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast2}}}]}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_TUPLE={0x4c, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0xa9}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x22}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_NAT_TUPLE={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}]}]}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}, @CTA_EXPECT_MASK={0x68, 0x3, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x4040001}, 0x20004004) r6 = fork() ptrace$setopts(0x4206, r6, 0x10001, 0x3d) wait4(r6, 0x0, 0x20000000, &(0x7f0000000680)) 19:12:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r1, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=[&(0x7f0000000180)='ip_vti0\x00', &(0x7f00000001c0)='($\x00'], &(0x7f0000000280)=[&(0x7f0000000240)=',\x00'], 0x400) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[], 0xfdef) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x804c0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r3, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r3, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) recvfrom(r3, &(0x7f0000000080)=""/1, 0x1, 0x2100, &(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x4, @broadcast, 'ip_vti0\x00'}}, 0x80) 19:12:35 executing program 1: ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 19:12:35 executing program 5: r0 = syz_io_uring_setup(0x4d4d, &(0x7f0000000600), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_io_uring_setup(0x535, &(0x7f0000000500), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff2000/0xa000)=nil, 0x0, 0x0) syz_io_uring_setup(0x3920, &(0x7f0000000480)={0x0, 0x8ff9}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000002c0)='~', 0x1}], 0x0, 0x0) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:12:35 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x1800000000000000) 19:12:35 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x2100}}, 0x24, 0x0) 19:12:35 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) r2 = dup3(r0, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) lseek(r3, 0x2000001, 0x3) clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000800), 0x510080, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), r6) recvmmsg$unix(r0, &(0x7f0000000400)=[{{&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000080)=""/43, 0x2b}], 0x1, &(0x7f00000002c0)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x128}}], 0x1, 0x40, &(0x7f0000000500)={r4, r5+10000000}) bind(0xffffffffffffffff, &(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, r7, 0x2, 0x2, 0x1, 0x1, {0xa, 0x4e21, 0x4, @mcast1, 0x8}}}, 0x80) r10 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$FS_IOC_GETFSLABEL(r10, 0x81009431, &(0x7f0000000100)) perf_event_open(&(0x7f0000000780)={0x0, 0x80, 0x20, 0x1d, 0xfd, 0xe0, 0x0, 0xfffffffffffffff9, 0x4008, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x4, 0x5}, 0x8200, 0x32a, 0xd3b, 0x8, 0x3, 0x1, 0x2, 0x0, 0x3, 0x0, 0xfffffffffffffffd}, r9, 0xf, r8, 0xc60e9c408bfe9793) 19:12:35 executing program 3: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x4, 0xbb, 0x1, 0x1f, 0x0, 0x2, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0000, 0x1, @perf_bp={&(0x7f0000000040), 0x8}, 0x2640, 0x7ff, 0x7ff, 0x2, 0x101, 0x5, 0x100, 0x0, 0x9, 0x0, 0x9}, 0xffffffffffffffff, 0xd, r0, 0x7) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) flock(r3, 0xa) dup3(r1, r2, 0x0) 19:12:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=[&(0x7f0000000080)='\x00', &(0x7f00000000c0)='&\'[\x00', &(0x7f0000000100)='-()\xc6\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)='/:\x00', &(0x7f00000001c0)='&\x00'], &(0x7f0000000340)=[&(0x7f0000000240)=',-\'\\\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='!\x00'], 0x800) creat(&(0x7f0000000040)='./file0\x00', 0x0) 19:12:35 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x46e2, 0xa3) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 19:12:50 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x2101}}, 0x24, 0x0) 19:12:50 executing program 7: lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x14d142, 0x92) 19:12:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r2, 0x409, 0xe) fallocate(r2, 0x0, 0x0, 0x4) r3 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r3, 0x409, 0xe) fallocate(r3, 0x0, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="01000016e07a2627bba6d500", @ANYRES32=r0, @ANYRESDEC=r2, @ANYRES32=0x0, @ANYRESHEX=r3]) recvmsg(r4, &(0x7f0000000280)={&(0x7f0000000080)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000240)=""/24, 0x18}, 0x40012100) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 19:12:50 executing program 6: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r0, r1, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x40) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000000, 0x4004012, r0, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000004, 0x110, r2, 0x10000000) syz_io_uring_submit(r3, r4, &(0x7f0000000040)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x3, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x1, {0x8}}, 0x3573) 19:12:50 executing program 3: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x2000004, 0x12, r0, 0xff385000) r1 = creat(&(0x7f0000000000)='./file0/file0\x00', 0x10) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) dup3(r1, r2, 0x0) 19:12:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x200, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r2, r3, 0x1000) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee01}}, {@uname={'uname', 0x3d, '^@'}}, {@aname={'aname', 0x3d, '&,*'}}, {@access_client}], [{@subj_role={'subj_role', 0x3d, '${@'}}, {@subj_type={'subj_type', 0x3d, '*,^.'}}, {@permit_directio}, {@fowner_gt={'fowner>', r2}}, {@fowner_gt}, {@fsname={'fsname', 0x3d, '!&:'}}, {@obj_type}]}}) 19:12:50 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x1f30000000000000) 19:12:50 executing program 5: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x4, 0xbb, 0x1, 0x1f, 0x0, 0x2, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0000, 0x1, @perf_bp={&(0x7f0000000040), 0x8}, 0x2640, 0x7ff, 0x7ff, 0x2, 0x101, 0x5, 0x100, 0x0, 0x9, 0x0, 0x9}, 0xffffffffffffffff, 0xd, r0, 0x7) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) flock(r3, 0xa) dup3(r1, r2, 0x0) 19:12:50 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x2200}}, 0x24, 0x0) 19:12:50 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x802, 0x0) dup3(r1, r0, 0x0) 19:12:50 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x0, 0x81, 0x20, 0x0, 0x6, 0x4880, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000000), 0x9}, 0x104, 0xffff, 0x5, 0x9, 0xffffffffffff2e71, 0x4, 0x4fb, 0x0, 0x7f, 0x0, 0x8}, 0x0, 0x7, 0xffffffffffffffff, 0x2) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) r2 = fork() wait4(r2, &(0x7f0000000100), 0x1000000, &(0x7f0000000000)) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x5d, 0x40, 0x0, 0x8f, 0x0, 0x8, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x43, 0x4, @perf_config_ext={0x0, 0x9}, 0x400, 0x298800000, 0x2, 0x9, 0x2fc, 0x7, 0x68f9, 0x0, 0x1, 0x0, 0x8}, r2, 0x10, 0xffffffffffffffff, 0x2) dup3(r0, r1, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x2c800, 0x0) 19:12:50 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) r1 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r1, 0x409, 0xe) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) fcntl$addseals(r2, 0x409, 0xe) fallocate(r2, 0x0, 0x0, 0x4) lseek(r2, 0xffffffffffffffff, 0x4) fallocate(r1, 0x0, 0x0, 0x4) r3 = dup2(r1, r1) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x4e20, 0xee6e, @private0, 0x7}}, 0x0, 0x8, [{{0xa, 0x0, 0xf361, @remote, 0x5}}, {{0xa, 0x4e23, 0x7ff, @private0, 0x8}}, {{0xa, 0x4e22, 0xbee, @mcast1, 0x2}}, {{0xa, 0x4e20, 0x3, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1000}}, {{0xa, 0x4e20, 0xf5, @private1={0xfc, 0x1, '\x00', 0x1}, 0xf5}}, {{0xa, 0x4e23, 0xe00, @dev={0xfe, 0x80, '\x00', 0xc}, 0x5}}, {{0xa, 0x4e21, 0x1e7940, @private0, 0x1}}, {{0xa, 0x4e21, 0x3, @rand_addr=' \x01\x00', 0x9}}]}, 0x490) sendfile(r0, r1, 0x0, 0x2) 19:12:50 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x2000000000000000) 19:12:50 executing program 6: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x81, 0x80, 0x2, 0x0, 0x0, 0x2000, 0x7, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x0, 0x3, 0x4, 0xffffffffffffffff, 0x34320ad1, 0x9, 0x0, 0x7fffffff, 0x0, 0x5}, 0xffffffffffffffff, 0xd, r0, 0x7) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000600)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d\x8a\x99\nkX\xf0\x9b}\x87\x03\x9b\x91\xdetH0\x9e\x8d\x92#\xca\xb1$\xf5\x98i\xe4\xdf\x00\x8d\xf7F\x10|t\xaf\xf0\xeb\x0e\xef \xd1?\xce\xd5\xea\xe3\xd3\x19Qh\xf2\xd6\t\xcfzu!CH\x05u\xbd\x00\xb5\'\x94\x8b7\xf8\x98\xf8K\xaa\x9b\xbb)\t\x97\xb1A\xb0\xd7A\xcbF\xd6l\x03)\xe4i\x8eb\xa7&}5\xe3\x82\xb2Ju\x9e\xd4\xe6\x94\x93\x03\x94\xe6\xec\xee\xfd\x88m\xf4\xe6c\x80r\x95g\x13\xc1\xe55\xb1\xb8\xd4-k\xba\x977UTQ\x0el;\xa0\x80\x1f\xa0\xf8\xf0', 0x6) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) fallocate(r3, 0x10, 0x7e10, 0x6) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) preadv(r3, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00040000000000002eb71c66a068653000"]) dup3(r1, r2, 0x0) 19:12:50 executing program 2: r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x402000, 0x102) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000480)={0x0, r0, 0x0, 0x10000, 0x0, 0x7}) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x41e2, 0x1f2) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 19:12:50 executing program 7: add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000180)="0c1a12e3b65c5e352c2c43b3c946bba911030d2fd95300fcae2d68fe8d85f0ccf671fa5d9fe6af050248af8471c47c59219a41153db57246716767fe348a8759753634534d87c31395a350ee9a47f61caae89f41c26ccac15f8788428e58ce0dbae95d1e8c36c596b952efd4296a7c2a4de83476448cd08f3d04a6bd2d4fe89bd0f9eeeca98d933213e97415f45fafd46971e267ba3abe36fe3a7d26c74be937513999a68c3078edc8117217997dab39aa9f629e", 0xb4, 0xfffffffffffffff9) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x6202, 0x0) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000040)) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105142, 0x0) 19:12:50 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000200)={{0x2201}}, 0x24, 0x0) VM DIAGNOSIS: 19:17:55 Registers: info registers vcpu 0 RAX=ffffffff83e953c0 RBX=0000000000000000 RCX=ffffffff83e7d02c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e95b88 RBP=0000000000000000 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85679448 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e953ce RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f097cfb0010 CR3=000000001b992000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=000000000000000040f7358000000000 XMM03=465081fc605434e3fc51f833e3fc61e6 XMM04=580a4d83fc58af75f6fcb76c9392fceb XMM05=fcf86d5081fc579f5581fcf27554defc XMM06=e1fc8ca423c4fccbeceb0efc34d50be3 XMM07=06060606020417015707387bfcbd68cf XMM08=c03f7b81fc2ce5dcb6fcac775481fcc4 XMM09=fc61e65281fcfa5330e3fc31470ee3fc XMM10=92fceb465081fc605434e3fc51f833e3 XMM11=54defc580a4d83fc58af75f6fcb76c93 XMM12=d50be3fcf86d5081fc579f5581fcf275 XMM13=bd68cfe1fc8ca423c4fccbeceb0efc34 XMM14=02060406060606020417015707387bfc XMM15=00000404040204020602060204020604 info registers vcpu 1 RAX=ffffffff83e953c0 RBX=0000000000000001 RCX=ffffffff83e7d02c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e95b88 RBP=0000000000000001 RSP=ffff888008987e70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85679448 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e953ce RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f097ba21df8 CR3=000000001b992000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000004188d00a00000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000