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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:45:21 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x40087602, &(0x7f00000000c0)={0x0, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:45:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x30040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000000000}, 0x0, 0x0, 0x20000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) clock_gettime(0x0, &(0x7f0000000a80)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)=[{{&(0x7f00000002c0), 0x6e, &(0x7f0000000180), 0x0, &(0x7f0000000340)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60}}, {{&(0x7f00000003c0)=@abs, 0x6e, &(0x7f0000000840)=[{&(0x7f0000000440)=""/194, 0xc2}, {&(0x7f0000000540)=""/245, 0xf5}, {&(0x7f0000000640)=""/67, 0x43}, {&(0x7f00000006c0)=""/89, 0x59}, {&(0x7f0000000740)=""/8, 0x8}, {&(0x7f0000000780)=""/134, 0x86}], 0x6, &(0x7f00000008c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x138}}], 0x2, 0x10000, &(0x7f0000000ac0)={r1, r2+60000000}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r3, 0x5000943f, &(0x7f0000001e00)={{r4}, 0x0, 0x10, @inherit={0x58, &(0x7f0000000b40)={0xa4716d4f88ccfb1a, 0x2, 0x2, 0x1, {0x0, 0x5, 0x1f, 0xc86a}, [0x0, 0x8000]}}, @subvolid=0xfff}) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r5 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r5, 0x5609, 0x0) r6 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r7 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f7265636f766572792c0c5b22cc019bf02be29d8c3ab8626172726965723d3078303030303030303030303030303030302c6e6f6a6f75726e616c5f636865636b73756d2c7379737667726f7570732c646973636172642c6461782c646f6e745f61707072616973652c7065726d69745f646972656374696f2c00"]) ioctl$EXT4_IOC_GROUP_ADD(r7, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r6, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:45:21 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=unix,access=user,privport,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB="2c66756e633d46494c450100000000000000"]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, &(0x7f0000000300)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r4, r0) epoll_create1(0x80000) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 14:45:21 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r4, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = accept(r4, 0x0, &(0x7f0000000100)) recvmmsg(r5, &(0x7f00000019c0)=[{{&(0x7f0000000140)=@isdn, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, &(0x7f0000000280)=""/144, 0x90}, 0x6}, {{&(0x7f0000000340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)=""/179, 0xb3}, {&(0x7f0000000480)=""/66, 0x42}, {&(0x7f0000000500)=""/152, 0x98}, {&(0x7f00000005c0)=""/101, 0x65}, {&(0x7f0000000640)=""/4096, 0x1000}], 0x5, &(0x7f00000016c0)=""/203, 0xcb}, 0x8001}, {{&(0x7f00000017c0)=@can, 0x80, &(0x7f0000001840)}, 0x8000}, {{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001880)=""/108, 0x6c}, {&(0x7f0000001900)=""/29, 0x1d}], 0x2, &(0x7f0000001980)=""/10, 0xa}, 0x1}], 0x4, 0x20, &(0x7f0000001ac0)={0x0, 0x3938700}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r6, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18}, './file0\x00'}) bind$inet6(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept(r6, 0x0, &(0x7f0000000100)) write$binfmt_elf64(r2, &(0x7f0000001b80)=ANY=[@ANYRES64=r3, @ANYRESDEC, @ANYRES64=r5, @ANYRES64=r5, @ANYRES16=r1, @ANYRES32, @ANYRESOCT, @ANYRES16=r6, @ANYRESDEC], 0x78) splice(r3, 0x0, r1, 0x0, 0x7b, 0x0) 14:45:21 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x101, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) 14:45:21 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x4020940d, &(0x7f00000000c0)={0x0, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:45:21 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:45:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:45:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x0, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:45:37 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r2, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = socket$nl_route(0x10, 0x3, 0x0) accept(r3, 0x0, &(0x7f0000000380)) fchdir(r2) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000100)={0x0, 0x0, 0x7, 0x0, '\x00', [{0xa6, 0xa14, 0x7fff, 0x20, 0x9, 0x4}, {0x1000, 0x2, 0x20, 0xffff, 0x7, 0xf16}], ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) write$binfmt_elf64(r4, &(0x7f0000000100)=ANY=[], 0x78) splice(r5, 0x0, r1, 0x0, 0x6, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 14:45:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000002c0)=ANY=[@ANYBLOB="6e6f7265636f766572792c626172726965723d3078303030303030303030303030303030302c6e6f6a6f75726e616c5f636865636b73756d2c7379737667726f7570732c646973636172642c6461782c646f6e745f617070cd060072616973652c7065726d69745f646972656374696f2c00810b5d4596f4f2b68c6899ef377f17dd341a76a458277ad7a1ce09e9e563dc77a412303a25042ee3146ddcc6c0adfe858d8b700648495c9e3934d296a3e37cbf4d19cc5fdb"]) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:45:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x80045432, &(0x7f00000000c0)={0x0, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:45:37 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f00000000c0), 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, &(0x7f0000000300)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) openat(r1, &(0x7f0000000040)='./file0/file0\x00', 0x288c00, 0x11) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r4, r0) epoll_create1(0x80000) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) 14:45:37 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:45:37 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:45:37 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x101, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) 14:45:37 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560a, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:45:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x80045440, &(0x7f00000000c0)={0x0, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:45:37 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:45:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x80086601, &(0x7f00000000c0)={0x0, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:45:37 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a2649cc55aa09997b19022ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89275c29c7decb81fb950000000040ddb827b44d010c05a5c98e52702b059eac222eecbad64abf414366a40197eedcfb2181ed287fad9c290de202b64349f90652599f5e5502d5904084eb98ef37f66802e57c187ad97551d2037eb89eb8e26cc6127a28b406a5e9949a381bdf78028030bf89fd805a0c9ac7798552125b8581902a347753c1a6272a382ee89fab33af8d2e27ae4ce599e6e84fcf15", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, &(0x7f0000000300)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000040)=@v1={0x0, @adiantum, 0x2, @auto="35500f59e36e2e92"}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r4, r0) epoll_create1(0x80000) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 14:45:37 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x101, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) 14:45:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)=ANY=[@ANYBLOB="6e6f7265636f766572792c626172726965723d307830303030302c303030303030303030302c6e6f6a6f36c41f6bae8454de65636b73756d2c7379737667726f7570732c64ff010000000000006178745f61707072616973652c7065726d69745f646972656374696f2c00"]) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:45:54 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0, 0x2001}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0x78) splice(r3, 0x0, r1, 0x0, 0x7b, 0x0) 14:45:54 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:45:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x0, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:45:54 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=0xffffffffffffffff, @ANYRES32=0x0, @ANYBLOB="000000000000000063bf0fc8159facbb02c50a9c4da4c74f4cefe3539d5de613b9e80c6ca8269bf813c799b63aab59"]) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {0x1, 0x1}, [{0x2, 0x2, 0xffffffffffffffff}, {}, {0x2, 0x6, r3}, {0x2, 0x6, r4}], {0x4, 0x2}, [{0x8, 0x4, 0xee01}, {0x8, 0x1, 0xffffffffffffffff}, {0x8, 0x2, r5}], {0x10, 0x1}, {0x20, 0x3}}, 0x5c, 0x2) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r6 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x8000, 0x8000, 0x2, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:45:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:45:54 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x80087601, &(0x7f00000000c0)={0x0, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:45:54 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x218, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x204, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x218}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) 14:45:54 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, &(0x7f0000000300)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file1\x00', 0x2c8980, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000500)={0x14c, 0x0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_STRSET_STRINGSETS={0xc0, 0x2, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4040800}, 0x4040) dup2(r4, r0) epoll_create1(0x80000) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 14:45:54 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, &(0x7f0000000300)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r4, r0) epoll_create1(0x80000) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r5, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) 14:45:54 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x97) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:45:54 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:45:54 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x80000, 0x10000) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0xe47, @remote, 0x7}, 0x1c) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000100)=ANY=[], 0x78) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r5, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r5, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r5, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept(r5, 0x0, &(0x7f0000000100)) recvmmsg(r6, &(0x7f00000019c0)=[{{&(0x7f0000000140)=@isdn, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, &(0x7f0000000280)=""/144, 0x90}, 0x6}, {{&(0x7f0000000340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)=""/179, 0xb3}, {&(0x7f0000000480)=""/66, 0x42}, {&(0x7f0000000500)=""/152, 0x98}, {&(0x7f00000005c0)=""/101, 0x65}, {&(0x7f0000000640)=""/4096, 0x1000}], 0x5, &(0x7f00000016c0)=""/203, 0xcb}, 0x8001}, {{&(0x7f00000017c0)=@can, 0x80, &(0x7f0000001840)}, 0x4}, {{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001880)=""/108, 0x6c}, {&(0x7f0000001900)=""/29, 0x1d}], 0x2, &(0x7f0000001980)=""/10, 0xa}, 0x10001}], 0x4, 0x20, &(0x7f0000001ac0)={0x0, 0x3938700}) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r6, 0xf50f, 0x0) splice(r4, 0x0, r1, 0x0, 0x7b, 0x0) 14:45:54 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0xc0045878, &(0x7f00000000c0)={0x0, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:45:54 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:45:54 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) recvmmsg(r1, &(0x7f00000019c0)=[{{&(0x7f0000000140)=@isdn, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, &(0x7f0000000280)=""/144, 0x90}, 0x6}, {{&(0x7f0000000340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)=""/179, 0xb3}, {&(0x7f0000000480)=""/66, 0x42}, {&(0x7f0000000500)=""/152, 0x98}, {&(0x7f00000005c0)=""/101, 0x65}, {&(0x7f0000000640)=""/4096, 0x1000}], 0x5, &(0x7f00000016c0)=""/203, 0xcb}, 0x8001}, {{&(0x7f00000017c0)=@can, 0x80, &(0x7f0000001840)}, 0x4}, {{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001880)=""/108, 0x6c}, {&(0x7f0000001900)=""/29, 0x1d}], 0x2, &(0x7f0000001980)=""/10, 0xa}, 0x10001}], 0x4, 0x20, &(0x7f0000001ac0)={0x0, 0x3938700}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x3) io_submit(0x0, 0x3, &(0x7f0000000380)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0x5, r0, &(0x7f0000001e00)="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", 0x1000, 0x4}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x6, 0x3, r1, &(0x7f0000000240)="7def72c2a2a7c4ebccce58", 0xb, 0x8, 0x0, 0x3}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x2, r2, &(0x7f0000000300)="2e4f6a0aeb5bbea4283644086b7d0dfae3a229a0e80ef6a1", 0x18, 0xbe86, 0x0, 0x2}]) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r3, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r4 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r4, 0x5609, 0x0) r5 = creat(0x0, 0x1) ioctl$VT_RESIZE(r3, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r6 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x24291e73872d243f, &(0x7f00000004c0)=ANY=[@ANYRESDEC]) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r5, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:45:54 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x218, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x204, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x218}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) 14:45:54 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a2649cc55aa09997b19022ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89275c29c7decb81fb950000000040ddb827b44d010c05a5c98e52702b059eac222eecbad64abf414366a40197eedcfb2181ed287fad9c290de202b64349f90652599f5e5502d5904084eb98ef37f66802e57c187ad97551d2037eb89eb8e26cc6127a28b406a5e9949a381bdf78028030bf89fd805a0c9ac7798552125b8581902a347753c1a6272a382ee89fab33af8d2e27ae4ce599e6e84fcf15", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:45:54 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0xc0045878, &(0x7f00000000c0)={0x0, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:45:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x0, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:45:54 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, &(0x7f0000000300)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r4, r0) epoll_create1(0x80000) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 14:45:55 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:45:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0xc0189436, &(0x7f00000000c0)={0x0, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:45:55 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x6}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r2 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) r3 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000440)={0x0, 0x0, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r3, 0xc400941d, &(0x7f0000000840)={r4, 0x9}) ioctl$VT_RESIZE(r2, 0x5609, 0x0) r5 = creat(0x0, 0x1) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r6 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000002c0)=ANY=[@ANYBLOB="6e6f7265636f766572792c626172726965723d30783030303030303030303094c8303030302c6e6f6b565f36f983fe92a457839e676f75726e616c756d2c7379737667726f7570732c646973636172642c6461782c646f6e745f6170705f646972656374696f2c00dc488c0dfc932e011b6ddc1b51c206d45c483156f4df2190033301242bdca98f7a0cbc213ae40d178f8b00000000000000"]) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r5, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) r7 = syz_open_dev$vcsn(&(0x7f0000000200), 0x20, 0x80800) sendmsg$nl_generic(r7, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000004600)=ANY=[@ANYBLOB="741300003e00080028bd7000fbdbdf2514000000ae004f800600240040000000080089000a010102080072000200000004008a00fc0892c1bd378c69bc7206dd3ea85d876209bc8e0b3772b1c33b509ac993fab69820009f705e1d789ab8839ba1d501801ab279c838501f1f395a5dfee62ae71dd09bc4f3d934b340dd66750027643a6482dbd30ce89fc6e868db81c2d135dad9e67a09544fc5a20a2b1ea18b6aa5dd96380c8b64e82689ac45a255c8884835f84c0ecf45246db6ccd9f6bcde465f000036946a2346f4aab61f5a2d98df6873d9b8fbbd8791b8bac5a1c0b30c667125831b680140c51a17dd219e2393f6fa18a003b0a829919dd39ad59d6d8f2eaa435521bf24e824b83fec2fbedcb84b5adceb0ba2d6fe0ab6b1920e1def2c68ad93e34da5e0e8f9d70b00f93c614e2562ea3e5d31489fb65e6a4935e391cba036d2a0fdb0cc43d0ffb312795f0e217526c3b7ecd864e54fb298feb6411d00811fe51d9809a58988cc83079d97b21ce9d5b217d18a50a83fd3b3b83ee32a0aa28fe2d9c9bd1bd11c26f283fdbb933b80efb7ee5daba59b45b00cd8b6b1576bbef49298dfc5eb976c5055f97b7ecd9f6895046fd04f2abdad6acd327218c242b46e49c65d223f271b697165add343f7169384a52d0dde63c79d77491d6ff5fdfdb2053cd2a73d9e79035232269a243c6362c956692c5b533b8e5f0282735c275e4ff6001f71202070edb63653834306d11f82f3b5bc952b5cae39cb7ea759bdcc7d9cc2529dc3c79884001551fa54a11175e1a64737629b714be16f7db95c3643f7b2c542dc46973ddd866b883a6083c8c5f046af163a3b12a375b68a8947015a6a0d0589251b53ac46b438151bb7af21f09e5208f8fbcd6b34b000bd8023893587bf7084747fafd3b49718d71972271234509f105627d8432304312b5b42f5453c7ec226d05d69d6964ad66cb067f08bbe9302f7fd3d854fefebf6cf7dffe751e15d3dbff06f64170b69b35c5a3593dd796122fa11631d8d916a99cae837c5d2e99f6c45f3f6463f495f497ff848dc780707550174b269bc1a8fbcd803315c49efc6b17df2d8a0f69157e74ab86ba9362d941b6dd63efa172ccbfd96efd95a639c2fb88720dfdb2007645926ab3f39263f5654be0f245580524ad8d50407bb1237f8fd0f497727b58928020da14d53315b98b675ea06d73510775b08f6ca8e2e0b1b1105d3ff5ef35290a5746742935c375519a85f23250a5dd8c35505481f5cb4d4ebf8e8e0f4a47735aa3d1fce48eb1fc61ca2cc14360e3dfdccfc69e5125ee5d44d4fdd99f8d8f7357d91397cb71b09f46b9b8ab6ac1c6e94011889b0e80f71dc2b0c9c87c652d3f6888d829ae9bc03f82fc80f99ae37cac4a7978765d822c0532be016e28043801467545d23b8b58ad8fd17eb8e3cf74c2215fad66306d10a9fe71bec0c1eb911140a3ba5a299f24e5e9700a8af850bc3c4ca000dfa20177ff3f23dacfe5963899279d0d9e7efede7425cc66584a779985182c81ca93deb2c7b28fcfbae9e58d2857073f9416a1ddc8d61296a9cb3b6148baa756ac8aba2275cb827950b76c5ec47cbde4cfc9baeb0fed0ce9bff5c0c2c1d0e4cce240e10f8f9a8b66c27bbaa407229beaaa659953e5b1b235a83524085e6b3649a5511409ee509f9e864511494a886075cecadd84e2c86648a18ab9b4eadbf07d83bd722290f7d90b6de62f2d1a7aa1dcf38d1d9adc4e4240769f2fb03d3b408b00ccf707c747ca347be6d62cee39bc109ae780c735f648207ef25a347b13fc2965269f4344dfecd755465d241228ec561c6eec5650d96e459725b0ea408e4883a8df37a4f8b1e886f0cc7907477202535a0d79a79a1ee03a1ca8beacd225c61089fbad88d548750bcacc3f0d8e1d07a10f92144f3817d9dae656ab9e88f5e73a4568b59e48d0b54010b93440dfcd662e113fed83642c98e659023a391e9debbb8a66037dd6986f0ad772063718644ba8c074a4e674db7b8dac1a70ef419472ec566b9918e3b6a649a8239db6888f454b1ed866dd8545af4ffc099628befb17cd1eb1bb9f35f325863e80cfe2cf32226496b980e7842b7ddb3dbe8bfcb94fdaf65ef9586ad99bccd05fc0d6a30ae11d3d7f9f8ef37981649b87eccaa609be004a61c0c5ee1c0af411bffc71dd8c542793e4e6e73e99fe889832170d466433a18764ad660a1901a336b1fc52e042d956622234af7737e532d221e4392551b0ea88a0ec398eda48104e5210d0cff3476b985c05544b08b6c72dff8a30f13eedba6de17ca2be4da9d6aa9cc1e7ccdf2ca04163d48d9b87c8eb30487165608d8fce35c022a7dcc2880768cbff3ac350abab7a2a794487a392fec7455f0b8b4f44e6163c9f376c98f49b366781a7a94658c41702f83951ef064d4004d384e6713fe5e1d5d90aec9907cf0ff768585aa57cefd796c99cbb8c42dcd57c0f4391c3a3ff14b577b910820f924046f862931f553a856bf84d4e2c8bc1750573c9350e312ac29e83a96d44091ffae09926053e6a23df154f55a8a6525395ac79b15ca98cc1bb516709782662f9e67e614417c11600a504823842485b5219d5e1ac802b9364672f194c66bf0229bec8f811176f0dc1857031a36f7512789f40ac555bd3ef70d0cefb58991af58e1c744cae532a1b33d6dcddc2f397bbff6dc04dbc385b27b059109b89764d604febfcc188ace29fd3284349ca31eba2b214018aac1ce926bc2575c80229d018aeb983846c999856f5f5a840de7f8472cf818d131020af2d93197fb8968222a4466df9392464b3d76df721b35c6f1921fe1802319176f881286a4d9a477353eb5db45772366bf60f5cbf995a5e2dec0d9d3e5ac8993427923180e0f50120f4c2c579a8a33a51b4537c39ab05612eb2f3491c0476b1e50056273280c0de9babcbd892267c5c709edbf15864d25e8da3a44e37a4fa5dfd679c1c6f9e6cfd11de153ba1eaac84a76148d0d406be1cb5f8239da19b93ae2ac56f583356461fcf7a7934388bb279e1a00b8365b7a629e287938dc02381831286cb92a88432d7ec053ae2b15a133e0f11a199d28db012b16b804261d035e6da6dcd1874147cc8948bdbf10434e24a9f6444cf183aca131ad097469e43c4759b7752b4d7625b0f1c195b1d6c5374efff5d4f7ef6fe0d441e4b0dd49edf6ea9a1e4821d3e29c9901ef7109aba174cf4f212940b52e39221eb0642a2a303630d85a0dc15895ec0c6f7228733f4cff2613e0cfbb944892a46f0374212da4d2d89bb919a354202a5f20a3671f340745cd16751f03dbe0c2d8c5aee88a154917a0e10249de0a6d02de2d09d35e48530179d7d4292218857dbab199daf8a4125b3d192e88c0b7f67a01b50bf182e7e3ab1a8dc84f93e7d72abfeb611ce1ed0a24d1f236e71b6d4ccc12e5055818a0c2177a944389770a73acc7510476754b8a306a369927618c8fbda16c1b3853f1b69f15d45d83f5288a5b7dc4da7029b31b08a3e2e8ed5158e0393532e006eb3cadae2179fa6bb3991a5355e96c818c8edaa0fad3b270d988f827783918e9af9d150580b8c41b7ba5087e40b8bc1b9349c44b359ee18dec9712ae5bbf203b50c26277ffc95dc96d1cdda2d405b79f218c117e023006b901528fd2fac79947da01c1371823d930f9157056f150b3c349a057215d3d9e88a5a7b5853a0d0363c4cf8d6d7d5f42f815d7a013e5bdeee2a744f4d17cbb51f8423027d590cafec632922e4601595f664c5b684c8dece54082422f4fc96b922bc3bcf3e41479a81fa60355d0ecdadff6fda2ba71b4ed20493b93ef68f6500e054f9f944fb39153dce093f6537be04a2634a1f7708800ef55136daaf081c22a53062a8cec58756c6db3b26f43a7bee2a023add342d75eac19e3ee74c6e04ae6b4963bdd47d1163c1aaca1300e80ebeecb0d0263f9538ef21c10cca17372269596a3bcedd50889587b2cd797e8f52be22d7e6f44b4df08c995a434ffaad0b73f8916e4418d93959b6875e6c45f7ef705fda870326414de787791c7f7acd1376bfa03dbb20a58e1c2bc6eea1426707f67de3ed4e1d8a4eb722e8df506bd45d86d0450aac4ac8357e56122f4441be55c8b0c8c8ac3cc44933e1ff4d76506e1ba7203bb6d85c76d315404748988fd653f8a9507a47fcca9c2623234ef1af5b2ef23bd006ba4989fbec07f928e94693fcb7a301dd5eeabf517c02bfb42ef336ca9690bde2a1bf82694f1713df719c57e4911be3add554cd8b9924d5bbdd64136dda5fe0d6f79e528ddb6c5b9a605ee5a23d35dbf09e7a599d58cb26636d29a451a134f579dbf05666ec7450ec66bb648d0aa8bbf2e186b9ae2f9812f47e03bcadd1834865ea97ae6c00fb4d152e32124cb22f22231379676001627f65087bf323067df85a197ab9d2cc82714a6cc78659652e6a00c59f3c215fc560532364ac4520c537650823c97c526c3f0f06c0687a2a1db202d4c98b23af707ee3373464ceb168c5f1c5cbd94dedb1821b50e7e2abaeb6b192cc4771720f49da5cbabe53b04c7303dbd29b9daad262702c15c9755f5e73895a17e89558da068c38760102490c3bc6145aa7e75f3ddf2be2988f08dcc0fb6664677a9e50bd474b36d46e2301074d57a2ec169c580d83850b08ec31b15d4a3a0c8e12ed24827f158a90efb3f692823ceaf4d648bcc2cbc455c894d7b904147f14e0d480556c4dbb3b9b6ec797323b0b64c1a70e00650ad349f8b87f9ad7e3ce259a180d893daf2a24618c46b0b80b92d007809acb31bc3c9265f07ab21fb75e1e99bea398f49d8f4b61a3f9ffa2cf5a38ee1617d1b90282d9d1b2c76a7808bc3ba046245615bcaf7f09a3dbdc62cb8bf61bbe02d4da26dedb292f13d52e8bfc56008a19c0d556ce01861e0b596b5ee47cb361d58dadc6388b9f11b64a2e205041e95cea44cdbb31c087fa26fc3f938e2594e01e13befc25c07a3466db09d50472412ef12b413d1ca24306aabffcfcb24ec0de4da3a1048fe3b6aac22baa67c79fafa6b2c28b30d286aa641b33fd3d40e456081ec93c8b980ec124ec7ba9946f8bc5b427b4bf728ff3590f6f6e59b1f720d4733dcf7c701d2cc7e34368a315e8d0b98f2297353ac6a0be0c1659fab8bab5b3fca5e8e589398a73473e83f683fc314a512df386581f99bc1a421be705212a0ee025901d5579e5f6c620f4986eb23bbf97b44779dc0700ed8e5098fdc06ea6c34eb2354152c1ddb11be08e0b84feaf7f831e0447599bd7471c522a5316e61953d1d9d64346a13ac90c776087d56faa0bff8325530e296bf04b66d71f65856875b2d94ca0fcca4890e0644119e19662ff2003cd942def5d04eef31843dfc6ca4e2a6ceeecc3487d8a25a25966be8f7e9642505ced8b513a921a5b0e9eae439a3b3d519524fb6ce8402fc369b7869758dcfb60f8dfc8c41e1fd37df8b77fb8ba33bd135593eb65188251dc2069c0265e9b62d3fb16b7b6e19afae45ab60ac8c4f755e7302aba35df9cefbd739434c538d8a12138580b03da6a374dc116237ef107930de0cf5abde83e83c34620562a120e9f3581ddc8810554ce5d533f93c373e2bda819524d15ffb95d29387cbbe608ced0c7efd47b87235a07cc98899e64f6301a4e5fc073ec01d7c1ce61d1b1257fc8076ade63c29202deb30c2a3fd20e4dc023c13c37d5d7fb1eb7a5eeefcb9135beaa18eef9507bc3fc6cccd71ca5e7b210f204edf46309088c18b421a433a8eec157eb3235bad4de9b857f1db84b2b42d06bcffe131606f05c4854893efef03ce715822f4066cbf4e2672bf2fd35ac2c48fb1f2fe505994e4276be87cdbbe209d934d85492b08da81f2d01d92d1c0ef73ce90674ffa69b7d9c5d169ec27d9a787baa286260fd30e043a823bab0e5192b40f77a5db3f019d4ff56a2e76575bf34a52f57cd634f4e06e79df21d081776fe854c5eb201fae558e8a827007928648cf31554dd5428fdc3fbdfb713f13771a9f564b9bd791df60a7a988bc32c75dfbf475e1dd4b7d01da81c19dda57702db345ffd978823edb88b5002c0083ee6b5797f5093af4e62647460df6a41bb3e3cefdcfac86c0b4557353f064c37804a4024de3317388a4d0cb0ab2e3e88e6e59deb02e5f6e317f53732639112fc3c72073bc32f63eec46765ffb052332c1aaf5cd546b845e48398ab4c4cb8a35dc4629e2d359ef257848630244613c527db2e07ddc1766887ac8aa5398d35f3f040e12d87f76bb54d1607c5a5cd3f43b38f4681100701db31484de616b1e05a16780e39a86d4f6a571e2fe2e1b884fbb8c000000bed3e76126159377569c8ec8043dd02dd0b41ed5be2da457f8789f88ab3b9434b48c6705a4b169d11c88ce86031b85991f69b66d752553eed3f75c84c3bef600e0b9114e9d3958f7550b4e30d473652e7284c66007b8d9ddd7e33bdc72292a7dd5f854731454c50b3d5c8ee8834bc757466c0f17571739ed6c023921211f34014c86dfa15042b7992012af9c450e72d15d8f165c56b03afc8f8d43780bee1a20f3f8ffa160008af5b8397de9bb9a22dc4ebdc35b9ad512aad1656dceeb6e1573326006357881f88598ffcb9b99d4cdf3eb3b2ff6b01097b590a07314d75ec70aab43d42eeeb308005b00ac141417640b056e51d2649280917ca1d17ac367076fd6aaceb77ec25a30b77ce271c053678ed5a6bc54aa5ba69060b4ca67cc87a4c32d763f42061e1c141b5745111e251e7b6e4afbf07a5d01c06aa12a22c7d8cbfda2e0c6825829f9a2632479170460ddbb57e46dc1f9cd96915c06ae1f665e22a7fc9b6a904c12f4c960f09d9d1cbc36920b07fa1fa367048d38f5846a6ddcbbe3bffa8b727a3a24a12aba3ad7fb9a3c2b4187ba607f6af5b39e63eb807df99b1000f85515da1e47e86ef62e116b1d4ce78b47a89d031236ae8b39d622d60a701ccf9f89fbd730d13f2a65e1130759a94cc7343c246b8ea21ce921c77958c0e7d00a5406f6f1ba332af40c003d0069dd5d67000000000000008b85b522dfce8bc435b3ff27bfef095e3c3150f6f851b7a533310d256ca2c05117a52764d611dd27df71ae8d7b3b6d6367fac53b7dcd4e6a4d339cad7a338a9f54a197afe28d14ac1b694ee778a6d85cf72b8f50d0eb0fda788113f7c385f3c2a39eb8bf9992cb3bc7e45356e6b154bcd1ccd5eb2b47fef5921b34b4e98eea078ff403a3c756dcac8532601fe36ef8676b0f4b4ed827f5d04f4017bc7751f21bc83db9b17a296d7876d9268ab8a75c5a93aa8aae0e3c3e"], 0x1374}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 14:45:55 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:45:55 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x218, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x204, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x218}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) 14:45:55 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000600), 0x3b175157a44cdf93, &(0x7f0000000640)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@smackfsroot={'smackfsroot', 0x3d, '!)2&'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, &(0x7f0000000300)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r4, r0) epoll_create1(0x80000) execveat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000080)='access=user', &(0x7f00000000c0)='FILE_CHECK'], &(0x7f00000005c0)=[&(0x7f0000000440)='privport', &(0x7f0000000480)='vfat\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='\x00', &(0x7f0000000580)='9p\x00'], 0x800) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 14:45:55 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(0x0, 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:46:09 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(0x0, 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:46:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0xc020660b, &(0x7f00000000c0)={0x0, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:46:09 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:46:09 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) socketpair(0x1e, 0xa, 0x9, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) recvmmsg$unix(r2, &(0x7f0000000b00)=[{{&(0x7f0000000200), 0x6e, &(0x7f00000002c0)=[{&(0x7f0000001e00)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="b5957f3574c93e3acfc12730409d6b9fc2eec7c9b71c719b7b680ce894d1010adfa582cbb025cc154e573c910abd67084440675d33ffc12bf677fe32d21ca7cd8e84793a0a685e26721f9691e3be7b34bcbedd15285e69a22624eca8382183277f33638acecd8000a369818f21db6e23e637d295d805cd91b8929bba679e8cbc"], 0x98}}, {{&(0x7f00000003c0), 0x6e, &(0x7f0000000480)=[{&(0x7f0000000440)=""/16, 0x10}], 0x1}}, {{&(0x7f0000000540), 0x6e, &(0x7f0000000a00)=[{&(0x7f00000005c0)=""/92, 0x5c}, {&(0x7f0000000640)=""/37, 0x25}, {&(0x7f0000000680)=""/150, 0x96}, {&(0x7f0000000740)=""/227, 0xe3}, {&(0x7f0000002e00)=""/4096, 0x1000}, {&(0x7f0000000840)=""/139, 0x8b}, {&(0x7f0000003e00)=""/4096, 0x1000}, {&(0x7f0000000900)=""/229, 0xe5}], 0x8, &(0x7f0000000a80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x78}}], 0x3, 0x0, 0x0) fchown(r4, r5, r6) 14:46:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x0, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:46:09 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) 14:46:09 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x400, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44b8fdb, &(0x7f0000000280)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x4000, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYBLOB="101b011032341c686c7c55cb9d0b8df40ec8b0e93d41f911c7fa486ee10a43923ee1abb8c9131398a44835eb2042d6f2e830d88a65e5cd758a4ff0f4c9df570421af2c21309303ce43afa1e3d85645b13cf10cfb0df89a4d", @ANYRES16]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r1, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x8180, 0x0, 0xb0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:46:09 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) write(r1, &(0x7f0000000240)="8bd9b1fe916ba555bcbf22f28a117f3c43c0e8c808ddbc183f3a55eba785e6e9dafb4e6af14f41843379754eb296ffa774a7ce2f91f407be439112b2898d6d8e40aee22402460e0e33a73323708566fdf77613bd0698f82d1262227b77cd5665145ea59719331664cbda393ee589101022852391f33116e1af7b72fffcfadf93a9f47b6b68b682bf4a284754a350bb1faa6b3db83923b12843797c30b5622958f1fc9da79d7dc5421fa0c08c1c540931b3b7297e63c21306691830455b510d659f5139bead4ff6e613a39296d8c5283987191df4b198f4b84df234e548ad6326733e3b5cb5781d0b17c26e332b073f8fb28f7f", 0xffffffffffffff65) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x123803, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x7bcc}}, './file0\x00'}) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0x78) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) setsockopt$sock_int(r5, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r5, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r5, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x4e21, 0xfffff801, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4d000000}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept(r5, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x108240, 0x0) splice(r5, 0x0, r4, 0x0, 0x800000000007b, 0x2) [ 2954.994678] perf: interrupt took too long (7896 > 7843), lowering kernel.perf_event_max_sample_rate to 25000 [ 2955.034182] cgroup2: Unknown parameter 'ÕŽÛïha+ë¥Fåã(ËG*dÉÕøOÐ¥bâßn·`ÉàúÐZ `‚·õï¡œÈ' 14:46:25 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0x78) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x9, &(0x7f0000000140)=[{0x4, 0x20, 0x20, 0x4}, {0x8000, 0x6, 0x6, 0x5}, {0x6, 0x6, 0x80, 0x1}, {0x2, 0xaa, 0x39, 0x1}, {0x3, 0x3, 0x8, 0x8}, {0x6, 0x3f, 0x5, 0x3}, {0x7, 0x9, 0x5, 0x5}, {0x4ef, 0x8, 0x4, 0x6}, {0x5, 0x9, 0x4, 0x1}]}) fcntl$F_SET_RW_HINT(r4, 0x40c, &(0x7f0000000200)=0x4) close(r1) splice(r3, 0x0, r1, 0x0, 0x7b, 0x0) r5 = accept4$inet(r0, &(0x7f0000000080), &(0x7f0000000100)=0x10, 0x80800) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3e, &(0x7f00000002c0)=[{0x0, 0x7, 0x80, 0x2}]}) ioctl$F2FS_IOC_RESIZE_FS(r5, 0x4008f510, &(0x7f0000000240)) r6 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) sendfile(r6, r2, &(0x7f0000000280)=0x3b06a2f7, 0x4) 14:46:25 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a2649cc55aa09997b19022ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89275c29c7decb81fb950000000040ddb827b44d010c05a5c98e52702b059eac222eecbad64abf414366a40197eedcfb2181ed287fad9c290de202b64349f90652599f5e5502d5904084eb98ef37f66802e57c187ad97551d2037eb89eb8e26cc6127a28b406a5e9949a381bdf78028030bf89fd805a0c9ac7798552125b8581902a347753c1a6272a382ee89fab33af8d2e27ae4ce599e6e84fcf15", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, &(0x7f0000000300)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x600}) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r4, r0) epoll_create1(0x80000) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 14:46:25 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(0x0, 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:46:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x0, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:46:25 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:46:25 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:46:25 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) 14:46:25 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) mount$9p_unix(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x10002, &(0x7f00000002c0)={'trans=unix,', {[{@msize={'msize', 0x3d, 0x401}}, {@msize={'msize', 0x3d, 0xdd0}}, {@cache_fscache}, {@access_user}], [{@smackfsroot={'smackfsroot', 0x3d, 'discard'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@dont_measure}]}}) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:46:25 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a2649cc55aa09997b19022ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89275c29c7decb81fb950000000040ddb827b44d010c05a5c98e52702b059eac222eecbad64abf414366a40197eedcfb2181ed287fad9c290de202b64349f90652599f5e5502d5904084eb98ef37f66802e57c187ad97551d2037eb89eb8e26cc6127a28b406a5e9949a381bdf78028030bf89fd805a0c9ac7798552125b8581902a347753c1a6272a382ee89fab33af8d2e27ae4ce599e6e84fcf15", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:46:25 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0x78) splice(r3, 0x0, r1, 0x0, 0x7b, 0xe) 14:46:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:46:25 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x3, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:46:25 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) 14:46:25 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) dup2(r3, r0) 14:46:25 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='aufs\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd1, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=unix,accesss=user,privport,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',pcr=00000000000004194357,\x00']) mkdirat(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x40, 0x44) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, &(0x7f0000000300)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8983, &(0x7f00000001c0)={0x6, 'team_slave_1\x00', {0x1000000}, 0x200}) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x9002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x1080, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r4, r0) epoll_create1(0x80000) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 14:46:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:46:39 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a2649cc55aa09997b19022ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89275c29c7decb81fb950000000040ddb827b44d010c05a5c98e52702b059eac222eecbad64abf414366a40197eedcfb2181ed287fad9c290de202b64349f90652599f5e5502d5904084eb98ef37f66802e57c187ad97551d2037eb89eb8e26cc6127a28b406a5e9949a381bdf78028030bf89fd805a0c9ac7798552125b8581902a347753c1a6272a382ee89fab33af8d2e27ae4ce599e6e84fcf15", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:46:39 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0x78) syz_open_dev$tty20(0xc, 0x4, 0x1) splice(r3, 0x0, r1, 0x0, 0x7b, 0x0) 14:46:39 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a2649cc55aa09997b19022ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89275c29c7decb81fb950000000040ddb827b44d010c05a5c98e52702b059eac222eecbad64abf414366a40197eedcfb2181ed287fad9c290de202b64349f90652599f5e5502d5904084eb98ef37f66802e57c187ad97551d2037eb89eb8e26cc6127a28b406a5e9949a381bdf78028030bf89fd805a0c9ac7798552125b8581902a347753c1a6272a382ee89fab33af8d2e27ae4ce599e6e84fcf15", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x14) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, &(0x7f0000000300)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000040)) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r4, r0) epoll_create1(0x80000) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 14:46:39 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x4, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:46:39 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000180)) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:46:39 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x21c, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x208, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x21c}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) 14:46:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x0, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:46:39 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:46:39 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x7, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:46:39 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000180)=0x5, 0x9) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:46:39 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x21c, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x208, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x21c}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) 14:46:39 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5441, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:46:39 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(0xffffffffffffffff, r0) epoll_create1(0x80000) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) 14:46:55 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x21c, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x208, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x21c}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) 14:46:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x300, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:46:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:46:55 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:46:55 executing program 7: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000080)=0x61, 0x2) fremovexattr(r0, &(0x7f0000000700)=@random={'osx.', 'fowner>'}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$bt_sco(0xffffffffffffffff, &(0x7f0000000740)={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0x8) ioctl$PTP_PIN_SETFUNC2(r1, 0x40603d10, &(0x7f0000000100)={'\x00', 0x8, 0x1, 0x4fd}) write$binfmt_elf64(r3, &(0x7f0000000100)=ANY=[], 0x78) splice(r4, 0x0, r1, 0x0, 0x7b, 0x0) fcntl$setstatus(r2, 0x4, 0x4400) r5 = fork() perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xb, 0x0, 0xff, 0x1, 0x0, 0x200000, 0x4000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000180), 0x383a5340b9e97f3d}, 0x4902, 0x8000, 0xffffffff, 0x9, 0x2, 0xfff, 0x20, 0x0, 0x1, 0x0, 0x2000000d61}, r5, 0xa, 0xffffffffffffffff, 0x9) syz_mount_image$nfs4(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x3, 0x5, &(0x7f0000000600)=[{&(0x7f00000002c0)="674dca33b3c73a3a3849f165f5f46a2c37e3a274806c1533fb1f4322a6de818ea5e9998af0ceed303fc2588c242ee95acfe7677b5a019f72ace5bb32650c509c7aba958687f0989161561b18981ea2b7217ae067f2f61a1651a516f58a2f94dfb7803140f73068f9406c83444f616a6191fecfe8d932428b9ab227c327b9dbd5394ccedf7e1d63b9af16488a58281151b81f10b537ea600b9e5073befbf5aefcbc6dc74798883eaafa6444f93574bc29ce8db0bfcbc50b7f48e4974b16ee1612af65e23a77e8501f66db7086a638ae69aa385864f19a3a8e390f525ab49ab47180b5937b487c2697934526d6d6ab3bb3", 0xf0, 0xe2}, {&(0x7f00000003c0)="4ace0251d31474aa6989fa7149bb9eb959c10853369697ca53a4a2080a382b197e30bbff2dd403c6cc2be3f3c885194e99cd67c6ad5ba57a5d7c81a862fcbc6f119d93d974ccd696220cb93258dc3f36530153a1f24373388b6661ae009f7e4804474a27fbabaaa462c480a917d777894aac38a623bbd4d7ec6dca69864a04c240f681efb74e359f12c714d7e66a7273cc1b0b8610d51a273ef5868eb3937a5798518c1cf8f8fbadd0b1286ac44e08243aea3c3a82359278c038af1ede00832ecef6c14b7291e813ccef72683a81ebec0cab72c933", 0xd5, 0x19dbf633}, {&(0x7f00000004c0)="4148c15d9a5a20706f018e0ea1fe79561bef5b8e86ffda692fcc60889f2126f3dcd6bf73701954a551b612460e470c", 0x2f, 0x8}, {&(0x7f0000000500)="350059e06819220df982160c2806b8393c67f169863944dbff840da6f5f9aab81babc5d3fa974329c408842f16283e377ee54856934f8f5a5ab4d1bf67635e82c6a218fb43e2a572b8f32f2ec17de3e3abc103bf1929e93ad8c73a6a3d3f9227e38d46d644edbe4ad296", 0x6a, 0x1}, {&(0x7f0000000580)="be70765e9956b689c61acd1ab0d9111d1d078e2116765916572eff8118d6ad50d4bdc57d762644f5d073b1e9abbeb01a768e37a31e85da9fad3b30746cce61ed13a90130df86d840f0b2134523b5d323e7e2b4c9a5aac61b9e14d0d22ca50809", 0x60, 0xfffffffffffffffa}], 0x3001000, &(0x7f0000000680)={[{'\x00'}, {'*\xea\x830-'}, {'\x00'}, {'('}, {'\x00'}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@fsname}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@appraise}]}) 14:46:55 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(0xffffffffffffffff, r0) epoll_create1(0x80000) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) 14:46:55 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) r2 = openat2(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x20000, 0xa9, 0x2}, 0x18) r3 = syz_mount_image$nfs4(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0xffff, 0x7, &(0x7f00000014c0)=[{&(0x7f00000001c0)="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", 0x1000, 0x4}, {&(0x7f00000011c0)="eb3c053df1fb521b2cec91d9cea7defda779a8b21d458d46", 0x18, 0x5}, {&(0x7f0000001200)="ded0a56857d2897d605031cffb505e799d87cd1dd5f0e2f2e7373962b2866f67b4f9039734fdc3a90547ec0430a1b6319b594ae4ee35fedabefd86aac6e5c6f3da94b79f2b94e4a9cd6d68071041536ff50682b9c37ed6b4a72c1396a9dca3083cc5ffe0216b5b20b32f895ccea6dc8401b028cc36287223493d06303769b0937f6f0c0f3b44b53133ff9307f8299caa20f1392da11837e2e853655a25a43dc7f38b50069f9d0ee2a9ea14d1cb", 0xad, 0xfffffffffffffffb}, {&(0x7f00000012c0)="6bbf9b2770b0037ce55f1a390ffef4ae9ad5f8f125cc9ebe9a1289a59b0c9486c23600a07d6cde96314e89068f3bccda461e73ff381b02f1dea60fef664efec53dc192ac07686c3e1289cce6f7a36e8f256ae45543112222d09a4ba1497ef18906dfc6beda72f96d3905301d2168b871a5ef07b2d9090147a538d61152e2514452b58f58ba0daec3543ceb29021ff1680e4f2abd93110b87d6b18086265e37c677c1dd94ea5b4a05c90bf268f00f8223", 0xb0, 0x9e7c}, {&(0x7f0000001380)="f39bc52bd0c882da9ad9ae36a9c24062c2f7326ff009201891bc785dfe1b702140a6621f47e0", 0x26, 0x1ff}, {&(0x7f00000013c0)="b119711bdc6c06ec7e5606890a6e82e962eb3902a2fa8640d95b5a68136bec0968d49bf4f674c6b87137d12c0685f077252e514156dc1ef2474af7", 0x3b, 0x20}, {&(0x7f0000001400)="f4ef558e7af3553803f78777419fe7d8e7976bcc8440c5a8e90a75b2171c627d56053642bb2957e40d21453d1eb6805f26421eae9f756bbe2b5d886eee06f3333ad2c3be09ede3822fcf81716f57ca5e30a691ba9731c485877709fb51c14d571f4240a5d0bb444ce67c6a323993a3abd20eae9c95782279ac8b438490512b8fb50a4ff4212ec5b9579a6343a87a360de47306851777a11472978317c920f633fa299371882287dddfd85ff3dbbc0ddb20a5eee3df", 0xb5, 0x6}], 0xd014, &(0x7f0000001580)={[{}, {}, {}, {}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@hash}]}) sendfile(r2, r3, &(0x7f00000015c0)=0x101, 0x695) readahead(r0, 0x7, 0x7ff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000100)=ANY=[], 0x78) splice(r5, 0x0, r1, 0x0, 0x7b, 0x0) 14:46:55 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) r3 = perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r4 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) kcmp(0x0, 0x0, 0x1, 0xffffffffffffffff, r3) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:46:55 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(0xffffffffffffffff, r0) epoll_create1(0x80000) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) 14:46:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x700, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:46:55 executing program 4: perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff72, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x100) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f7265636f766572792c626172726965723d30783030303030303030c8c65e221ae7702291f2fb1b69a430303030303030302c6e6f6a6f757209616c5f636865e36b73756d2c7379737667726f7570732c646973636172642c6461782c646f6e745f61707072616973652c7065726d69745f646972656374696f2c00"]) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000180)={0x7, 0x3ab1, 0x3, 0x10000, 0x0, 0x3}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:46:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32]) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:46:55 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "3777bec46cadbec271ef1a0c69089f0d25ae7e7eef5c3a9c2b7a75238240879af13fa9a798e9414746c82eeed7c3f61051ead3fd4f7852fc8398ced850c9faa4a7a4362f97e73a13b24a40d6b0c43dd359291244538f69e9f69f8d4235d6f87e205032e1fd6a33d9c2ad298732eac946a3c526c60bfccffde72b341101c6b716b285b64d9d48359c351b9c960d5e98a3e7705b2f1709a04425eea4914a3e19b8c51bfa05ee967a769b2e8f29313bdc98539e92d6bbddedb92a7367b3c4a90000e595f3469efc0873f277db1bfce53714129dbbb15961bf618a48771abbef15e4e54aa8fe83deda7b230c9613af597bd8d2cf95c827862926aa3c1fb38092"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) 14:46:55 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a2649cc55aa09997b19022ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89275c29c7decb81fb950000000040ddb827b44d010c05a5c98e52702b059eac222eecbad64abf414366a40197eedcfb2181ed287fad9c290de202b64349f90652599f5e5502d5904084eb98ef37f66802e57c187ad97551d2037eb89eb8e26cc6127a28b406a5e9949a381bdf78028030bf89fd805a0c9ac7798552125b8581902a347753c1a6272a382ee89fab33af8d2e27ae4ce599e6e84fcf15", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, 0xffffffffffffffff) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:46:55 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x9, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)={[], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$TIOCL_GETSHIFTSTATE(r0, 0x541c, &(0x7f0000000180)={0x6, 0x4}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:46:55 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) 14:46:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0xa1b, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:46:55 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, 0xffffffffffffffff) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:46:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:46:56 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, 0xffffffffffffffff) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:46:56 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0x78) splice(r3, 0x0, r1, 0x0, 0x7b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r4, 0x31e, 0x0) r5 = eventfd2(0x200, 0x80801) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r7 = syz_open_dev$vcsu(&(0x7f0000000380), 0x9, 0x80400) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r9 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r9, 0x31e, 0x0) io_submit(0x0, 0x6, &(0x7f0000000500)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, &(0x7f0000000100)="9232a0570c273777ce58af5ea8354e6bccf0ee7785a64d766f559673ab09275a595b622dc2c5d26a2cd95b61f2815f772db5740dc018169fc5420a7cc66f12148a1288bafc09c45f865ac218611e0b78fe93973976c505bacf4d", 0x5a, 0x0, 0x0, 0x3, r4}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x6, r0, &(0x7f0000000180)="1cda6acbe4cc7c20cbed7fd9cce1705a9fc29362d3163e57328bdfecc350e8a3f257234cae82fe86f02984f200c98f5bc7e8af48ab", 0x35, 0x1, 0x0, 0x2, r5}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x3, 0x8, 0xffffffffffffffff, &(0x7f0000000200)="8c86a4e67c0bbd084585febf3221e60e3ba0283982d2e88386b981fbfb6832df0730e6b0d23d397031b81c38203124f30c6c241702869b8ccd09a938bbc1ee31eed1d94df0c74e2bb4679791221b997291034cb33240", 0x56, 0x96d, 0x0, 0x3, r1}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x5, 0x2, r6, &(0x7f00000002c0)="8ac086c592a101765286b9b41a9bb57b9972e3519aee933e28dd56b755dc8c342e828ce3b4a561eac273742038ce0393a21785ee5d35be3d9ada3aff9ba2d08c6e8cf133502b20539c9dd29586e7965609aedf196c", 0x55, 0x100000001, 0x0, 0x1, r0}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x3, 0x7, r7, &(0x7f00000003c0)="a94bd22baec7862a34b2ee934f49be6112040ddfd9894f", 0x17, 0x7f, 0x0, 0x1, r8}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x7f, r0, &(0x7f0000000480)="759ebf3e52833624d1960256820505d11ba17e747b14066db00e98c7d371fd8a3007291a96a31706027ae475601170927549b60adac711b4aeec", 0x3a, 0x3ff, 0x0, 0x2, r9}]) 14:46:56 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) 14:46:56 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x9, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)={[], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$TIOCL_GETSHIFTSTATE(r0, 0x541c, &(0x7f0000000180)={0x6, 0x4}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:46:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x31e, 0x0) r2 = openat(r1, &(0x7f0000000200)='./file1\x00', 0x10000, 0x107) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x5}}, './file1\x00'}) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r3 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) flock(r0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r4 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000002c0)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r4, 0x5, 0x0, 0x7, 0x2}) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r3, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:46:56 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x1b0a, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:46:56 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0xff01, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:46:56 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:47:11 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0x78) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @in_args={0x2}}, './file0\x00'}) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r6, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000100)={0x30, r5, 0x1, 0x0, 0x0, {{}, {@void, @val={0x8}, @val={0xc}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r8}]}, 0x30}}, 0x0) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r11, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r10, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000100)={0x30, r9, 0x1, 0x0, 0x0, {{}, {@void, @val={0x8}, @val={0xc}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r12}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x120, r5, 0x8, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r12}, @val={0xc, 0x99, {0x80000001, 0x77}}}}, [@NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, @random=0x1}, @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x21}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x3}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}], @NL80211_ATTR_TX_RATES={0x9c, 0x5a, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x14, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HT={0x10, 0x2, [{0x6, 0x6}, {0x0, 0xa}, {0x6, 0x5}, {0x1, 0x2}, {0x4, 0xa}, {0x0, 0x9}, {0x3, 0x5}, {0x5}, {0x4, 0xa}, {0x3, 0x2}, {0x3, 0x6}, {0x4, 0x6}]}]}, @NL80211_BAND_6GHZ={0x38, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HT={0xb, 0x2, [{0x1, 0x8}, {0x3, 0x6}, {0x0, 0x9}, {0x1, 0xa}, {0x1, 0x2}, {0x7, 0x1}, {0x0, 0x4}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x950, 0x301, 0x5, 0x99, 0x41, 0x2, 0x2, 0x2]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x5c72, 0x20, 0x7, 0x7ff, 0x8, 0x2, 0x1ff]}}]}, @NL80211_BAND_6GHZ={0x40, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x21, 0xbd, 0x632, 0x8, 0x8, 0x5, 0x8, 0x1000]}}, @NL80211_TXRATE_HT={0x25, 0x2, [{0x7, 0x7}, {0x2, 0x2}, {0x1, 0x5}, {0x2, 0x2}, {0x4, 0x8}, {0x1, 0x2}, {0x6}, {0x1, 0x1}, {0x1}, {0x0, 0x9}, {0x1, 0x2}, {0x7}, {0x3, 0x7}, {0x1, 0x4}, {0x3, 0x7}, {0x0, 0x9}, {0x6, 0x4}, {0x3, 0x2}, {0x0, 0x9}, {0x1, 0x6}, {0x6, 0xa}, {0x6, 0x8}, {0x7, 0x9}, {0x2, 0x7}, {}, {0x1, 0x5}, {0x1, 0x6}, {0x3, 0x4}, {0x2, 0x9}, {0x1, 0x6}, {0x3, 0x3}, {0x2, 0x5}, {0x1, 0x5}]}]}, @NL80211_BAND_6GHZ={0xc, 0x3, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}]}, @NL80211_ATTR_MESH_CONFIG={0x24, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_SYNC_OFFSET_MAX_NEIGHBOR={0x8, 0x15, 0x45}, @NL80211_MESHCONF_HT_OPMODE={0x6, 0x16, 0x3}, @NL80211_MESHCONF_SYNC_OFFSET_MAX_NEIGHBOR={0x8, 0x15, 0xb7}]}, @NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x6}, @NL80211_ATTR_HANDLE_DFS={0x4}, @NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0xffffffff}, @NL80211_ATTR_MESH_SETUP={0x4}]}, 0x120}, 0x1, 0x0, 0x0, 0x8080}, 0x94) splice(r3, 0x0, r1, 0x0, 0x7b, 0x0) 14:47:11 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5427, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:47:11 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) 14:47:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) 14:47:11 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f0000000380)={[{@norecovery}, {@barrier_val={'barrier', 0x3d, 0x3}}, {@nojournal_checksum}, {@sysvgroups}, {@discard}, {@sb={'sb', 0x3d, 0xe3}}], [{@dont_appraise}, {@euid_eq}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000180)={0x7, 0x1, 0xff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:47:11 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0xff7f, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:47:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:47:11 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:47:12 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r0 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) r1 = creat(0x0, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r2 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f7265636f766572792c6a6f75726e616c5f6465763d30783030303030309f14516a303030090000003763332c6e6f6a6f75726e616c5f636865636b73756d2c7379737667726f7570732c646973636172642c6461782c646f6e745f61707072616901c973652c7065726d69745f64697265"]) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r1, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:47:12 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x3}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:47:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x28, r6, 0x3ddc8cfb493e3995, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5}]}, 0x28}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r6, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "3777bec46cadbec271ef1a0c69089f0d25ae7e7eef5c3a9c2b7a75238240879af13fa9a798e9414746c82eeed7c3f61051ead3fd4f7852fc8398ced850c9faa4a7a4362f97e73a13b24a40d6b0c43dd359291244538f69e9f69f8d4235d6f87e205032e1fd6a33d9c2ad298732eac946a3c526c60bfccffde72b341101c6b716b285b64d9d48359c351b9c960d5e98a3e7705b2f1709a04425eea4914a3e19b8c51bfa05ee967a769b2e8f29313bdc98539e92d6bbddedb92a7367b3c4a90000e595f3469efc0873f277db1bfce53714129dbbb15961bf618a48771abbef15e4e54aa8fe83deda7b230c9613af597bd8d2cf95c827862926aa3c1fb38092"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) 14:47:12 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x0, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:47:12 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:47:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) 14:47:12 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) r2 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x31e, 0x0) getdents(r2, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r3 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000180), 0x900, 0x0) io_uring_enter(r4, 0xc31, 0xf6da, 0x2, &(0x7f0000000200)={[0x100000000]}, 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r5 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)=ANY=[@ANYBLOB='norecovery,barrier=0x0000000400000000,nojournal_checksum,sysvgroups,discard,dax,dont_apdirectio,\x00'/111]) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r3, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:47:12 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x0, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:47:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, 0x0, &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:47:28 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "3777bec46cadbec271ef1a0c69089f0d25ae7e7eef5c3a9c2b7a75238240879af13fa9a798e9414746c82eeed7c3f61051ead3fd4f7852fc8398ced850c9faa4a7a4362f97e73a13b24a40d6b0c43dd359291244538f69e9f69f8d4235d6f87e205032e1fd6a33d9c2ad298732eac946a3c526c60bfccffde72b341101c6b716b285b64d9d48359c351b9c960d5e98a3e7705b2f1709a04425eea4914a3e19b8c51bfa05ee967a769b2e8f29313bdc98539e92d6bbddedb92a7367b3c4a90000e595f3469efc0873f277db1bfce53714129dbbb15961bf618a48771abbef15e4e54aa8fe83deda7b230c9613af597bd8d2cf95c827862926aa3c1fb38092"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) 14:47:28 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a2649cc55aa09997b19022ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89275c29c7decb81fb950000000040ddb827b44d010c05a5c98e52702b059eac222eecbad64abf414366a40197eedcfb2181ed287fad9c290de202b64349f90652599f5e5502d5904084eb98ef37f66802e57c187ad97551d2037eb89eb8e26cc6127a28b406a5e9949a381bdf78028030bf89fd805a0c9ac7798552125b8581902a347753c1a6272a382ee89fab33af8d2e27ae4ce599e6e84fcf15", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 14:47:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x9}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:47:28 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000340)=@updsa={0x13c, 0x1a, 0x1, 0x0, 0x0, {{@in6=@empty, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}, 0x0, 0x1e0}}]}, 0x13c}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = fork() r2 = fork() r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) kcmp(r1, r2, 0x5, r3, 0xffffffffffffffff) ioprio_get$pid(0x0, r2) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000580)=[{&(0x7f00000002c0)}, {&(0x7f0000000140)}, {&(0x7f0000000380)="f48e", 0x2}, {0x0}], 0x4}, 0x811) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000003d40)=0xfffe, 0x4) listen(r4, 0x0) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000680)={0x0, @l2={0x1f, 0x0, @any, 0x962c}, @generic={0x2, "57e024fbba407bb59a5b9582ef04"}, @vsock={0x28, 0x0, 0x2710, @local}, 0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)='ip6gretap0\x00', 0xc4, 0x1, 0x40}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000600)="eb3c906d6b66732e66697400020801000470008400f801", 0x17, 0xf10}, {0x0, 0x0, 0x1000a00}], 0x42049, &(0x7f0000000240)=ANY=[]) 14:47:28 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0x78) splice(r3, 0x0, r1, 0x0, 0x7b, 0x0) 14:47:28 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x31e, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000100)=ANY=[], 0x78) splice(r4, 0x0, r1, 0x0, 0x7b, 0x0) 14:47:28 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r2 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) rmdir(&(0x7f0000000200)='./file1\x00') ioctl$VT_RESIZE(r2, 0x5609, 0x0) close(r0) r3 = creat(0x0, 0x1) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x181100, 0x28) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r4 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@discard}, {@dax}]}) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r3, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:47:28 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) 14:47:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x10}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:47:28 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) 14:47:28 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000180), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x7}}, './file1\x00'}) dup2(r2, r3) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r4 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r5 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)=ANY=[@ANYBLOB='norecovery,barrier=0x0000000000000000,nojournal_checksum,sscard,dax,dont_appraise,permit_directio,\x00'/111]) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r4, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:47:28 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) 14:47:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:47:28 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) 14:47:28 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) 14:47:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, 0x0, &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:47:44 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0, 0x5}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0x78) splice(r2, 0x0, r0, 0x0, 0x7b, 0x0) 14:47:44 executing program 3: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000007c0)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) io_setup(0xf7, &(0x7f0000000000)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) statx(r1, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x2, &(0x7f0000000100)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x31e, 0x0) io_submit(0x0, 0x1, &(0x7f00000005c0)=[&(0x7f0000000580)={0x0, 0x0, 0x0, 0xe, 0x2, 0xffffffffffffffff, &(0x7f0000000380)="561e29cf50de7ab5655927b124b865d63e692bc372ecd9c1341804e235bbf00f7b0b45fa4785edbf2b6fc507decb0adce64bd316b07be1", 0x37, 0x67a6, 0x0, 0x3, r1}]) io_submit(0x0, 0x3, &(0x7f0000000540)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x800, 0xffffffffffffffff, &(0x7f0000000800)="d55b9ce1cfaaf09ccaa89bcbc9528db9b770f3a453917d165e1de0dcc41295520058aece1d1c01165d3559f903d53be9ac2595923c7b37823587fb4d93c01c06782db2cff69b2d20dbb51752021714f3d17e2d0e45aa0578402b2284b1055d69889abf9f0601f607bc08bd2df540599b8bceddcd0915eb95233f7daae76e0bab7d4bf091dd7036df56f492151991788da03a3ac827637826daa8c99a1f716b8e90521136fe121a41b1261b8459c40e1718d991163ed9b53774e63b32996fb4e53cdebb075fe5aa0fe28d2b26212cef888d618263fbb0c2639e908534c4bfb2fbceb2abcfce59321a9beba6662ae704e20346152433e6c8cb20fa7c133fa58320bd46ce3f13f03bd926d23e7358aee197d5fc227e608b08e763d71399a6eaa7274d4e7b105e5a5b77ba549ba47b56591b3243bea2c69ffaf0f2c30d5613f2f608abc0626a0436a6f0929296029e0ff1147edd57fba88f981d88fe14d73362c563e9983a4af5d1f6a65b3275cf095efc89d35118bf0c6f347a8d83487f949dcfd0f593b66f59065552194d888cfecd15f912b3c965089414ff6595a7f82afb0ba3ff84a31049893bf98fee76aa81f6979cac397dae1640f022eeaa557aa00e4045bc5b7b282346497fa27df65a9e31b0eb0708e5fce5aa863d5c8194e81058e102cdb0e484055b5ba9d9e107bacc633e03ca42c892b6672ce91ea02cf6657915e742a50e59f27f11451bb1df487648aeb95c65774df0c8eb4e87eda4ba0bf1114141205785456e2659afe94a72f65714e2ae40e99e65af4e47431f778734706918ea28e32457a18bc8bd7af5852a67221cd19aa519d0ece9bf3c95ff457314a8c7701abf27a5992b63c624cade2ac01b7dd3dd3c8ddc73e855c43c0f3ae19eb0fce2822035db0e8591afe77c4b55cf877bf58b26f3eb90888ad9149b1b4c1bd38d26c582bf0035b4f0b57de8a9103eefdc222c92e8ba4e027c25b17227b0df6020366bd883b00c47ad2babd84abbf9a9cc149929853e0edb6dbf1f27dec8a9dd2d36f899c26c1c89dc31ee97ae7a88e5823c07790be77d823552a37b262b38f1ce55db78c6a4d1a8dd103a2586bb74912ec0d3bc4c33a7b6862c56e378b82a2eeb98176dd6339bd7cddbb313c5e6fa7a9ea3c384523508d1c4ea341d0e32a852e3945a10b7f797cae932ea85a26f38536d5e004c160b1f6cabc3398d352bad88df629fd9b9090cc510927b0958f354ab7dc392991fb2ae818f3bdabd70c9d2e869cc4fed9ae837eba3aa5fe18b903bbae340a124e7d5d6ff7854bd3e8f3d4bd8323c57f52a2a91801a1d70163a2b3e2f526b7ec02b4e99533defca551b0bd5a1d9745d7788bab0f55eae9a817b85ac6834724f2ae4f3e486d530742a6ce78aca9e5fca09828b9361f5bb48ac26abdea3f0e0005ea256811cef72d9e6c1aa852ce406e017c29523771123c84dfd1dc3d59d08d38a8f0794f4968865b4c594fcba4d893cfbdf937c27590323b081aa681636f37d145381b9d8344f709c241dc8fd474f884889ad91b2aaa6f2efea7171ab1d265cecc71f2481e8895fe1eb1b842095126d593e961c65875ca282047dda66e545d9ecca81f55a4dfd3636154a0596ed9d1a18df8dd8083078854cb3c7deb597aab5ee524a367e2fc221e715fbf954a40b24c57b89609ebcf24a4369f76067a9cce271c6171351bdb01cb58a4ed305a06c2aa566c47afc1a61b9a87fdc275375b6b1ea53fba305b99abed4621936a94ab6938406f3787636bdacbf7f3c6f06c02985bef413141e3b0a5664f8417f6ccab563bf5fd70b72d16d5a83f6009a624f1199c9d111979f9cc396f0fedc7ee30b08e0563a9b4e421f4260b070bf3ec8cee6b3c139ee6feae7792a01792b88954d2f8d3f81700a950a23e71f16ad034a3a4ec893300730c6054d21181b22634001f89e239198c8029122afe59c5facb2e068cfba8ce64ca291de401b3a2facc5fefdb3b0206659c3360011fc1c10c4a439b1226d4de85f9df36596947f5c1ac149f1ba6ce5ea141fb01948c3564d4f67b3a5583bd09af60c61f6807f6f178040ca48a69b7ad2dc23e339b975a9defa50c932054a5815460a37f41f2a7152c4911fc5a44bd38be746af187b49649ed319e9ecda7a5adcf2f1cbf4fc3cfdcb15a142171fb0e886932e3bab20918f3671d1d749768e0ef82a49619bc2768fcca273d7ac8921838206f54e36441176aa45b3565b33c5491f222472946ccd98fa89dc2798f0364dcd4f65a52f2551ad58cf78764e8d2f96028cfa08e409a8c99cdae8511a668a29537e42eace9b1f36def70048d4822d2a268c5f8bf7d7747a9819fa3c1d64af4e090ea6a5b58fc1c6a246e2b97c110631d93f8e12a69c3519e50d0bf3c1f9ac1ade9a0a43e5548006f00838e7a6de818c0a6bfca910fa33dfda6de57a20fe97d1ec007e69047885fd497e6585a435711d702d2a211a6fcfbfaf74e7eee44ae5d8311d7682bc41d2f250075c3bd5b3f696090a1609d1ff90455ef278240db15604bb7aaee4163865335d33bf6e2588e5c7fcd851df5861abdf633c113e02efdd5388f444ab1b434253b72018298897dd1d2687c0900d0ba72aac53906ae9e039b8c29559e11f54ec0a07014906ad57e54961eb8a6ffc931e932dc4992eda0dec07a2755d67636700a863fe29f9eae4389bc1f31b0580be99fcb5c20309282bbdc97968aca1eca74733b860e8e1f0df9e9dbdf4f51fd0b609ed4e38941146bb92763c6f4ab1f9c5b3e21d30485abb552ab34ba5a05865fe70a36930093086ca6f1a540cfd1f58f597938c8d4e4d49db8b7d1e8e915ca920b2b5aa0f7d62385455d77733632b32168cdf8453ae98115198cd37cf11db1950c02f0d11514df64199e1aa29bb2f519555dd94c5a51d7d4881f1fac8dca46596a77cb49efd0715c103b8a420bb8a99cd0b89d9b30544444c48f299932c39ca45b595174840ddcdd46a69046d37d80b566f45fec63d7c45643a16aab4614ddd5c51b81fa94461265d3f6cdd902736908d235404fe9be3a4681be431ebd6f92adaf6cd4bd6d6d6830b67baa2b741514a9235434168195e3dee75dceb9dda400eb93f42bc958881d1262c6ced22992545216361bcc7afe29f7652950237772ebba28f4fbc058163c1467f7e328d906ef385354f9a6a78deb3b4f595a6b497f4f7cc6f30ad86ca6bb2f829958cc43446ec6be655fb8cc8f9733f862f1605460ac8683071ed90477092bd6c77674113f6309a56b13745f9f82c78cea34ca7d2cb2a8574304b7a3fc61c141a6df17831e11dea93f1fa1923a13d86de74e5ce41d6fa688dbafec1a2e98e292479100f15e87a9d38059c74841591c46a74731a7709d89b9ccd3876eb4a2d9b68f691599877864290afebde1869ea0c243b442f707f973b6c8690163d9dd281bca4d97697f13d6d2daded63005e6d60288e4262474e5cf2bce197d1d2023e76a63872447efa94fbc44643069b35d8b7708e57789295b863b4902556f589f08b7df40a609fdb95bb4bf34ee6fe6b47f9e141714d93112d8c81ea119e73a109717e6efd5355839c3e0027909567ba4a5096e78981e404fdf559348e8f9e0fb406b5c39e60b740cf7b4a4da135eb02c5bd71b71d089a78f5a03dc0e2407680c29b9223b04ac72bc1c21901be99c789a1a79238fc82d4db01cf9f3d00777b5cf6935e56a749f974ec8648120eac5ab33a26f65c4921eb2f393bcc4517edc27a572aa5159d2f49c99e2e793193dd936893af8c62be6dfefd0d2dbf444de8e62d2aeec4c85b00b9094da2c5463a965a81ea1a74553705af6137f30245f62e41ce33d8c92cfc7a3b52a5cc38bba8d54e1766798d51ecd3925b56e6b3e3f08768c19217234d1f7fae2223dcb8b98fc1399af20c70aee0e059cab58c8996c924bc8176afb384f8b29fdda463d0c3522bfcb1907e4d690bd893643ddb81bdbc191639e077bc830923a72926605615fb3d723d85079bb8fa168f72e25ecb07522398ac48453ba344ae778dfd2aefd72a5a1f2a35b73039d7483ebef830f2c68788057a81ca3d1efd31c9c047e7259bcac971ef9c7cc2755bee53c2dc1cf835a2551cec71a69e5e9e5c181bc990ed048b11e5eef325cef2bd70fb744e135fc4abd2a3b07cad1d7edaf04f1be8a11fba5d718924b40962aa979dd6b472db5dc307dd7fe8ab0f9484654dee2aff6ff99fb97a43d2939d4d3d46738313ee419a703193207bb3ce6f1eab844a189ee6969ec208f152cdb752677c8ffe455d906348cfcd5e0b1baeb04a2577d29637e23977faca832ae29f3df6e64000fbcf60456895252d3b2837b7c0ae8ad2285f0122c5c3584eeef0510514fc9cb9608ddbf17c6bf1c662c902fba6189af1242e2e5119ed518ee0a52a86acf0d7c0a41a7f1401769efc289bb3262e8c2dccdbfdf858835cef424fcb18b1c6a0e135c6b6a01bb32b68d826f5514061d6122e233d266a996b8d58e2a9e35ebb6638d40dbb0650cf450192a88985487f3c849bbc3668141d5d735c45580ee61901afcb50eb87df2032d9ce7fb7135f0af49111c23abaed6b706191ba0fa16bdda6507d2865ccb5108c7bf59afd39b3eb6d903c214267722d4ec5fbb32a40312d8ca98258465e2ae486a9361b419280ae6736994be822d69dde294e48268f04e84fd4d90a893a2730a53b99b602accc3a702192a6c8071bed3ee33d94b4b589a39340e6290e13e5124d2c1ae106139e2493aabedc3c4594813da58bb86e39b1dc877264a6b1b7c51b3eaad3058f59ae7e5e8fb56407eb42672c734f8da7e91d31071f9109b67eb5159c732823c7889cbbe9470b5c270cb517f09da65e2d91093b7765851182092ebdbc043aa028e586a36addc6d237aade7b29642cc760babe20c77b4293ed292e9ca562edde0f952de34aca7012371023a9e9a3c86afc7a88bbf84753eddf32f090c18d4e0261ae000a39be6b46b852d040227269e8c0cc2b705b68058b35a12b1e00f275786147be0c1edbc46af96518875610cdea24a43c174b3dea0b2645e6de7a5e12fa57bb1469363efed97a83d9e0aae80e2c5450e912adf33581e762784d805e5ef06324d43428de58840fa5b1a81b3e7fe899587a1bb492f01c6c9f8e644e9bb1a7671f83d75359099b88eb2ebfe6c2d4b5a4cd5094be5f8b85c54c54d78c59ae77c45ea9cbbbda48f10bd944796deb611874cc9c9857a2a7983719892108b7ff6f61283722d5688ab33fd4231c0e4be4e0cbae91777b2a82e0524cab5419268dc87b86e94b4d94563f8c45ac8b8be7b2b8f6c15ccdc5809126b353c44e12c2c9bebc3ddb5ecd266a91144acc5c1e196ff8e5bf6966430ecc274d09211642b41bf36e094c68f4f7243cf349be89915c37cd874761bfbbea2cb0f2d8854b61249085fd83ae31a95c0025c614b156400b18229bc398babab36764a52f93655ba0830c66073b57a3ea1577e85a8fc6137c118931945260ddaa369fe33a8938515159c07a1907e2524dddd93f433d6d8e9de4d7366b08d3ab2d6493d5b01bd4fb7f78d6627107c0b65106548de13992bacaee632c4d023d0ba1035704f1ec91a687cc672c12f13042167fe3decb9bc6c694706ea81304be95390e3b6b04f062c6e2507439792df007308e8acb94b3d8c868b334b198b8f06bde9e0dbe425a48feb40a7940927d4615d0ddb933686ab5ebb820f64fc67853c35338ed9a4207896058ba97dd6c62d34409e103d22c844b7a6f7c7bae2d2914e4378b126522e563ec7f3a47", 0x1000, 0x5, 0x0, 0x1, r1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000001e00)="19147890b888f473d1efa0703ca2152f04fcc2df481f3c7e64b731521f3d58041f2522b7cba0973c924bd43e12aa06de16af90c6bd09accd264b83b5b4ecd2edb6052ebaf019bb518700812a1b642613fcb59a07cf256f65c0a72ea5c23332eb836c2fea62773bd78d2cea58189ed497269ac4d6249a98f541890eec5093b553d6206c403176e078925b6473cbb3cfaae702bbc73460cd7e46dd2ad4e9bc6914d3bc8a736deb28811f87e94dbb4e0677c1be5e16d4453885466fe4ddfec6e9334f7e819e720737f801977876a83b77175712ae714b9e373008bf82ef2d1c53b0b685639431b8e84ccadce40ccee38e5d2a2413c28c5388f4393a0211e1444d4729d98cb36bf3b8f64e24fa6c8ee4e56994d79d0aecef567bba33af5c5a685207088a472304d8a53a0212e8daae20621f18d07c62c3e4c333002b058ef2790fac0daa15ec66411512d461a3279fc963bb4846cb413602a3ece6d9615fd55103094e86eeec5929e5ea7fc78981f2a00c722fc0d9be88464f7242950096857c31aa47416ebf569c71fa66484ac53d56e7423510b2260a20d90dc694987015ce0ad49bd394614f00c8f991380e6deb68a047e06e835007dd59d19424457e86ca89727cb12025f825b972ff735feb0e8c51b5c703564907263ce890b988e35546493559b25bac25551878c3850597c00ad58619213b4e4d52af3812422fa85f06d028a032ad741b46eb65619c0e471ac2481f74ae240722e86f66247738dfa419f64b8c7a3b89892736b92fe5df3a8857cc131d8af9364d9465a5c041ba61d6f800bad6bc435ff2d25e94cfcefe7db4ec99c6227d60edb1ee85eea44cf862d016147ccfc1d684ca2b7575db86499e02ea8108051065360c95a84aa2b01aa9be4ba42b975178a45f1f83e1bd17d412408c5a4859d8072bc803699746eafefeb110439d4863cba240c571600e47bfb3d43ce2078a36db6387bf6689a1c0ddd0a01e5323b41058e5c842b4e7fd7e7c5e1c5b62af0c408844bf901bfbfc0e5faf7ec4e028d5334388bfe79fce44f52d539625f0303815798f0cf2d45e55ee5aee532a1ea843a395a83a75d4cebffb8febf6667d91e7ff4882b953cc31d445790c0d04f6989ef54c970e59e071fe9ceee11a1b314e5d3aeb8628c1573f79b1d50d56db078399801e2bee35e03082a54e884465562bdfe97fcfb37ac797cfd1dfdfc20234c29faf31cce169e5d4129fb98647b67fa8546cccc27321a630a88be3a40755f289924d336a0fb1d0aa5d8a8ac8c9216abdfc14b43c892253840dc2a6c68b4f3868f26ec46d6dde163ef9e9129dc814cb8ce413a502a5e3b1573a70a79405d846308d7822348d6caae5502a41d071ad9083e48dcee02c17b4f77cfd1502da4e05aaf07bffdee1308a824346d39d0566071538885a4da899f46563dc654322a1f98c04cc77c990d5ec6697635b4556f372ff17c6f39c85934668f2057916b67fd8fa43072441a773c6cba4343188995fb9be9bf43e53be4a42712b867f442764508b00b9e711dc40391bc57e4895172c6220a4d4cf6b7e9d6ef372b14eae8e158df65e8d5e9a159ee02833dd18faa20b22a871c4b653b450d0094c4b7e5da03d010c238ff655e9aadbd61688c56cfbd36910138c8381fe755791eb17ec61c0cadc41793f73a60ee7b722520c405bb324165be6535c765cf2ccba8bf24be3b3dc919b4eba97702d1b588dde830eaa7f87e14b40f3ae2eca35b64c956ad4ff1c16d828d45c322d00aff9710e500f558f35965f82f8a6c8e24bc8d16c424584ad49044f79042b9b1319fa03ad23903a7f05a883c2e030fe89f65e8d267434fc64aa17260f6fabbcdf3a7a44e76f639671182fe53acb4be3d1c36ec2d903e3af4c79878ff2df7cfd3b5d19866659da1669189589a07a48f304b09f8f091f6d9cc036d4a6c3397d0ae1526b2dee029d45140ca775f5a70f17eee1cfb56eadea26fe98a3c09ebd5bc5ac94c2cea53a2c9978d18b5f460f161e1641ea5488eb951b480356039132b871b7dfa5d936399f31c617f6bb2bf90e2621d67f86f432ec025de8e7b50b171f3ddf41c7df5a457992993385e6071a7d0b91d34b0118c12715ff72117398745dbee09be013d720339d2187d3d43c8898bb5054340634b4179ba5c79d88ce476514a7f889c1ba7fdf0d9979d6e8631f06d07ec571347354b79612c53535fbe515bd6b33dbafb86745a5aaf42dfbb4de50d7d39432f741fc723ee477c220603aaa2d135c45b209aca1e916538fc0184c2d249730c27d63cb9cfdb863a499551843d8c9f01636f36565c4903235eb6cb7d6029d27bb5e33681853c5ed06ea7c1ae8b78bb4ad73e99f358385b8573fb4dc111910ef05ed54257f54fdc95c8b192e20f25e505cafd3d181ac47aa23fbd7619e360e25d2188b84e72d46540d5449899324c501ffb2630d2c8e0d8091587ac26ad38eb04b132ad8a219d09b40a876fd6f67b66caa6189de2d23e9698225001cf65c33372ccb2bc381f468fdc84d14b02fa7a307768613740fcabfbc2383dc2abdc20673b215b4066293ea2b1524a2fb8f33ebd7524fb881ff371df4117628aa14e0f3227f70198c6761bb831c0258e60b5087cc064148515201737bd6451807038c78dc2db2f44e314f321aa208c443e7403e91336fa0f3051c0260e667798617cccf277d3dab2762c96fa758455b1873b53d186ba3ce97ff896cf4d241b6c8fdba7bf9778677cc4f82fd0d47491e30da4c772a756c462f3ce86c9252fd06622224a2fedf66cf406d41e31c50e735546b7f887a53c11a28cafc39edc903fb59a1810694b66d604e342a27b1402f16d6871768517ef04d57721bea5cfb87b78c1c86a8a0c1324d1efa7526406c1357b88dad3cd8106205caf4480b5fb9f34622d7507d228d6bb9ff766db2a6722e9afb689d03cd520d5a2d99fcc76f111c3e2006210737d96b11e097ffa92f67aaeb8668f47bd33657904d2a88e88f58598af1a25ba4bcd33af55fecf8c81104a58c7e1baa84029ee831d45ccac908030528cb136605afc5a6c4588a18e13896e24d8f4383ffaad635a4f1cd0cbe9da30d23abf046496f10ada040d5e4002e14337b60f51116c0ac803318b565d58ccd5f954b55717d39a8d837e32cf44b112ca816493beb14b935d2cb3405fd741908bd9f0b5709a743d98629337c8fea3fd8461de3102c35b3079f0d96d1b9e27ef0f50b27f098066e3fd316cdab6fe547e814b5d87e7bd605509403cecb41204a3b4474f6ee9cd20ef09ce7edf73b9c19b3037dd9479c527cd5f178e58e84ed43ffecf004cff74d4ee17de5fd4769970818871aad87bd8eb199624a3f0381682b5468c6e1e39b2ba79f611a12419286b1dc6c09ba9845631b43e6ae052aacb4ec94e0cf4940221e371852ee936847f6de2ca600b7feff3e58ff7e28c390a80cf3aebe8c616f37a67f1bf0c10c52898fdb9ffcf32ffc78134fb158fff241495fd7732d3a7fec6eed4472a1cf6467e880789591a37d8b9302b0a849cc3dff2f553279a62e2e160a1292f6e1fa2dfe74a5cc5e63d513c1952113e6a71d29bce883bd808e0e1b9d8c26ac3a7f6c5c18cec62ac80e26e57467c27bda860253b518023745ee77d7fc2179b66c1fd57110ae5e71327099df75761725d00bc5b1ea3029661caf5c1e5b4d3008e9353fac10b6352e7315c2781b3748cb3f2ed5581932c5938fcf143634305e4fe4e68144b52ac1d53eac20538f1f743c0aa42b0f5a4df140a4228fe10a1567f086fce62473dc53261a2edb38e744f071447280888f30b608fa6ac607d9063617c4115ec0c239d7749d9a45f555ea0adcd6ab3deb953b18e7342aed968aa134e78aa7b7eceb0a5a647c00ac552971708b2da3752c2f30f1837dbd5cb6e49143c8576ca15655e167eb14c63572b116b4e8c89bd2c83abc1249da820fc55a0b0532c086e7f30dbd1798f0fcef042db44cd22d6d9822c2ee5a948a5d597b57f2a06a5411692f4701292fe05b38b2c211daaf893853db6f84c7662ed17cf1e81db9f0acfa3e4140d47002ac3a936d4a910038a8f6cc1166f33525247e3db21022a5889e56fc80c8fe79aea844a792b10a35aee4e8b54c85d674fc19b3a20ef0612e65d8f292234af766a54322fcd67d5c913ce2ffe274a9612052120b33ab303493d1ee2a70c7f12738cf9015184dc568b8d07a0e5162412b652bdc637c28908092a93ef1be7f7e1becf4533ee585dbedbc77cd38ace1989ff6ee444c4aed7747a989de1c37de73260e1e297e745bb623ea4247803031fe62d416a9a128a4a95795cfd989a72551c997b246cdb10b3d6d5bb68ac079293c6d948bc52a7bdc721bf9bf73fdd2ff0b4266ef252ddbe50f59a249b3214f685e9d34a2d50e894ebcd4a3d19084655250145126ca04e43d860a30a098c923fb2ac491f191bb5631f9703e3ab81553e4e02d1dfd334a64b21ad39d800ea1aab198ca36be9c1f1ba4b32bc1a2cdba59c5fbe447a66db29218850787fe709da47c53745e83549f405723ae657b7222abf32ade8f9368d5844fe27900d300c48289f9b7bac79ea44c4c7d23b89cb6fb52078c0200a4d7fcb70b4705bd9c4e690018cc705b9117e21fef9b43de4373b35c20beebc6111d2084313167b8eefb5ea4c70e2a2e0989ef864e62ed3bae54a540f26bd5d671b0ee967d8fb4346c7b16753c606ab0ccdc33643bac7254e55d42ac643397d1118b717fa54de3a72662e9290230fcc5e3ad82e4c0775222fab65577a54ac58849690a813b6471bd6b6c624c9f0e625e2ba8d9c93e488b3cf12680bc30b8425c81ee80bf84e545426ba8503715d23bc1a85b8dc6bba4ba3ef29277d1f1b3c2f9161ad4d2deb58eda4ada2095c849c34b7678e9a37b353ff833f8afdfe551c4760bbee70c8ae823e70e723e3312e65f03b312a688957188019f2afc444a877365630c4636fe57b3d19c846b48d8dd01ff19577a0ba76c756a958fe18d4b1033159fb314b89d4c2d80c14256280681df3ed91d50cbb466c539a7186c2695ef46f9be1fa13d4bb61abdb5bca508821dd001b3d52d1727fe215e725d3996f4584d5f040ac1b93f2969e9221d0a2444042986155dd65ef7edf76c85429ac79d283f1aef6222de9ae36195697ae68776071edc31eb91af2b93fa4196f514879e69a614a4f959e507aba342c6b19fa9f99e4dcd22ac6a5c329fdf04b6697b504257382be7d53673d6154704f213e1e02f8ee865cf25a4228eb3595f6acf4072e6dd9ae9157a5c272a8666df90fc1baa0aa9e3b507c6141905fb265e9f23c623133f045c37fe7659a2690f080f41d4aedd15be32028228ebea2919559e57dd3143bc25a86dccea9390aff474db33335ee0c06eb66a3ef46cdc4cb2a9f2e3ee4952e41173a7aea1a0ae2e6699396b9bf5204da90e98626beebb6e6eb673b10fac95851d74d9b08c385e2dbbbeaddc5e526264b4df77e72ab1548308ad5dd67a2ae230ca3ba436e207905fa6e568e4e762d5c75649a4dee87040881e0fea0fbbd9f34cde908d20810f3edfc767bcad6b51e8081a72f1d85d95917900899f095d04dc916f5e59942c0faa154606679f927d803e1d1cd86abaf7ea293741ba488b862af51731ced9a6df870071c5cccd1be081483cc692ef439a70b6c2580510b94c634c0665a3878698ff4b3d9207ef5adbf64e01acb7c5c531fd5da7019a8612c661a00fd44cd65406a07804632fbfeda67a07089b20577066c8cfa7276c8b1219afa4367a75524b", 0x1000, 0x6, 0x0, 0x3cee671bde505513, r1}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x200, r2, &(0x7f0000000400)="fae78a968437cb54bb34a5d497514d8e69aa62967a53938ba0c8fe8103c9f0b3fe80acc26fa358f401976e56984dfed40b7c511cc01568451c34265a45d4cc90173df6c34e9265ba38a90e5f3e3ac4f5435faa36681e7db3929dbffb6322a6aa2da208061785bc2ff323fca282cc4902662fa6c0590c7ffa4855da4bbfa1bca0cf028e49d2491c6089d172824108bbe055ba49285de1bfebd44b4613f88909a5b9b3eab01a29110de4b838de4ff4fb82409d332f79e882ee389b46456199157c6742554a05def9f1f9e3b9fad76f336f32d38315f11d157d7e9aec2fae3824", 0xdf, 0x3, 0x0, 0x2}]) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socket$unix(0x1, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r4, 0xc018937a, &(0x7f0000000600)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB="b12db9fdd720992ee23789dcc939ed1cff822411b54e63bf08e86e69ff232951e72f72f0986ef096e904288e03a5afc642118da8ce2918f40f373a530702a933711c73762aebabccd0d5702270aa111f55e4756df6c728269411f0692a66c1df54e3f9ecc77a46da3660b1e23b00"/124]) openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) io_submit(r0, 0x0, 0x0) 14:47:44 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, 0x0, 0x86) 14:47:44 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:47:44 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4, 0x3}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:47:44 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) r3 = getegid() setfsgid(r3) syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x1ff, 0xa, &(0x7f00000017c0)=[{&(0x7f00000001c0)="4bcd039ea049ff3405d9cd25f2a22c80c2eedc1c79fc6d194ae6a0be9ad77077d5f2e55dba7d707ed561cbb77c317fc0b64e9e0248db433c0fea2eaf", 0x3c, 0x8}, {&(0x7f0000000200)="a74c28255a0d9be4d06b051d6aef58cf65980bafe10e4d1ccd1c6f3c5751912a296007bfd424d0553714e995ee3f8aa547c84d0ce60533fa59737c74d3758c54f582", 0x42, 0x7fff}, {&(0x7f0000000280)="40b5bd4db60a98844986a8eab94e63b655f81447092d94ea3a10ddeef0134dd4cee35e1f456f6b8f9d9eea17e15c55abb2992c9415051ee98d366604b47e07bc1f1d70b18f07d24927806b45b4", 0x4d, 0x1}, {&(0x7f0000000500)="60e0eb99036dcddc40d6dc699bb3ab6d41d953c3d3fc83412cacfec0b7895ef14cb31fbb74904fc46e26dcf9102ac8b5d084cdc8da5e39832edc6469cdf19c8128948202231a91022234d2e5ffb2197e64b3dd15260cbfcc92a5119a173c408aae85088fe06d0ffeca1c92afde13f05db5694815e1173ab4796f18c00e5bbe433364fab6b710e6eb919db2634f1b4d5190f17ce0ab2ceaad6de157dbba570c5e82ce16fe940800ed5bdd661d357928773e6f4a78fc26115ca1d7ef66184a56e3bb50d47c20d21a8322802f6bc587e3e4e4b88afa32479a4059e7b7f6b24c238f4dd61b81b889b964c0a14b1cd0716eccb63cd805931119e8975d74cafb88f7cd4d60629c05cbaa3c7a131ea992369c3aa3c2f96501c463f63bc8e5be27de88fb97ca04deff7125ac5d433fb223033d83b9b4ca32b55a2d428a9a6e43388f2d4677fa2d3f4f8b981f7f884ebbbf2bd3256decb428faafff6eb56da1c8003b82abe38332b8bd7e4937bc00d76bab230cf5f077c601b35e6a9b8a0683c7ec2ae1f3fc55b34849e7f007da6b114441d1499b5fad6068d002f686a92b7523db240e32ae4a6eed5f808db565ea12d79b71a5ab61cbaa593ba3f22e9d128585585c996b1f8a976fd209c1f52c0cdd0cd008a32549545b835e2e2036503eef6cc217190d0e44bf4ace5617f0776dd04ce5f2d7c9d616232767bebcb4be341ec0f046fdc3c239e4c1bc059d3edc17aab580b9d5add7e5e5ac22aeb6648bdeca74a2a67ea56838ac3376dfb3530a899cb4a286fdcd6b0359a27cea880709b3eef14b50985389d79e58691b5fe1c091568d61a940bc4e494454c0bad04d0841d2ac70223b33065885b896c78c3f4492d73d7caba8c385374605b441bf75e3bbc18ef4091558a90f323a910322d8c1660094f2b4e0b177c91e8da6826b1fe43ed5df35dd527230e2b08383620519ba7c1175d5f4a372e68b5f94f91e4d205b77842a14dbfc5431695b8ac74aa1bd4a2fc2639848ba4ed468a079870cbd3b6444cdeb688f4bd789440a1393441ab1d403a23e880f68aafe8a256b77b80484d1cf488ba4f2505a98ec14b82f68ac18912551533919be3b320cb1e0e8cd623f16cb7dc3ffd69d90feac61057e3c31d8e4bb498ffb858b625df333df7a111f0d3bc17f4f00c6154ba48684112b364f49a955d0bf63ba1c4f8f62dd31698204f63e345c521558768d1db1e5491f6af74b6127eb65e20d5ddff6ffbe877df9bec7082a50fe1c05a7408d89154676daee1db9226de591328dcf0d7442e895bf45ad7230a938231ffb57aca5096d183fa2eaa732fa950a0903bf5fe50aaa3382d0bb865c4511b158a086f618431d124356092132e2304e20d1edcbf76b0fe931e62cc3cef6ae8d7a3bb6a487b0e960771498a676890fbdb22bab84eaacdb168acbc3dd49267d63964216f46d7784eb046e6a6fe4a6e4fd499db12643464f5b2297492b16aaaab0d285ddc6ca7c84e9aac28f4bf4d84ecca2fce6e55a2fbf349f738216d4270ba6159299a61d3d01359201977a0c0e6541d88fec61c8adecd0e7ea0e7dc815c006617ddf887324993706c1e00ee8e9dc0beb064e72035d08f7d6ce82292b9b8d0c60b3c518a2333467314dc851a5def3851ad31243e72b9231ffe1f7d0a714b935298516a6abccab03f4a0053ec9be0ae263dc49a0f0f9c927e98dab2b7adf6ab8463d0a17e59da172bfc2144d5d9ac1bd5a1b25be3c1ef85fd2b839c5e2c0d73a63787afdfe31fc120c0aa792c362e9636e2bb380c215566ccb96f9d67c56bfec0f255c8d346d2f3d1ba4863fefbefc72060928a2540171a23825c9e1f30ebac0fa9ecf1b81cd0d9afddfe278ed7a43f36a21594566430390a7e527d419e041de187a862bef6ec3044e504786b813af1b0ebf9124cc88b4ba3a17d267c398b257923228d97681dd557c007b33cf1c4ed9c49db0ec3a540c669945d7ac8cace9b3a87c04fad409db4429aeb33d72ba971297c311b84b81ae45873e8889d1f4dfb99b657799c8f856c980498b4ca06778745279157883dd352d08ebdf3a9b1bd46358f0fafa863a19341e34eed217dfc2781526330ad56d1b9a3086ca3f9e5cb6c6649aa9afd48395d24df0725c33c85209c73286ee3fe6c6bc57b97dd73cfc85085ec5d8588a2f2e960fb63e2bd01160c8f0ce844198dfa0b20ed62ae385016f54128dff41e67214b4f84247fcc4245cdb91e769c68690b73f8129a3b06f9b08bd2f21c6e1f550a47aa5408c9d5d289df30ac3fe70d7cb844ecf122d91ac3576465e25b4fe9c5074b928a486b60da896fcf543586b1fc6dc00ecc52b92dd79cc215ea1637a68be3eb7292891cb85db788cb08f615f2a943d7ab7acc487657e61aca5316a2ff64db740461eb995983636b84987c74047b5c93eb38ec65362616dd9f13101899d1d153ceee9f9c8247727bf69a763fd578e31ef03a15d1a6ea4ec232bdb3ed53d0ad44ce7f8d8701d91e2d09a77de91da66b494b444c01971edfd7c8fded931bbeaeabb5c5df8479647dfe9e5a765c85253571723bbe2b90b3bc9a705fae56adf39515f752324887d46bec970384b3c5fded1e76d32082abd9c5ec0530ce467f883a3c44a28bc671258fe76e9e3a188f74cbd70119e1609f31c15ac18665033de0709a0f256521d4fa8a87c4f87c709000df3addff2867ac5c868909ac45fda392d61dae0ce3e190c206d3742b8e7cabe6b4fe59d50fcababc6b9900636ba51cded988ccbff327d9a159a6f6c365536b8ab07f25819867c2d4a8dc8ea71603ec1240a453f2fc2966fb03b3276a21d3cdda983ae82c69585740d2bd03b6ea1380633d35b9eb6ded0d505b783e63d938a57eb4f5b8a7082a964fc4b7d361110a78a312f35dd40916181e9614ff5a4575d0ff018f2a63b9794626aaa38dadfa1ec026b88754b128df999ceb3dfce3804bad7fad381e63f62c2e5340d23641ae71fbff5b01ed7df8e3bf20fa625f3d9fb234dbf3ffa7ec700f96498615c3bc13b2bb825e3cc2650cae71a54e5057a9da8e8127fb917761c39d71ebffcba094fc9ad7b15c2ebf026ee4b9e22a3f978038ae66bf06de204837fadb414dd9c58089add1a63e6f42529ed5ad348bac45404a7921c523b689ff990deb3105bf8942035f2862c653097ded09424c347820c43dd80059e25f70b6bc19f0f3cd29ad4da1d86fa1b61acd713911b60ed99db5f9dcdcbcc44ae8a07623d444e36b25cb5506c8ad70f2c967a43051bdf9bb59405fe52575c5370e3c4a494f3c3efc25280f72ef47a242c06dba003bb0c892913df3dddf97a345b8b16a82dfb9d85f1dfba0c0e42c5ac47bb7abeb07f53c705a79a43abc286748a656398f9ff28ef8c3503cd0bb60e387a9c58770f964043814604a18a8d7f0f3c0788080ad522e4fceb006008882263df2e3a9ba5b71edd896df3558b298c4dfc2f1ef850abe7fde3f7065d6b82690eb4b70bc0eb9205b38ac67ffa91922ad8d3f8923c32e176e9f5d32aa538869925f22dbff116e0875b8dab7f5c29350079da44231d58965c8c54e1466b1e16ad677805c64984cdc07d731453bba4dbf24901fefcd4bf3de21a7da0121aee9ab865d1798a3ae0d859e8a61e930b862535de0184b000c033656d639f06663d137c6798af12863a04a4fe2139f59e330b9efed3aecd712677c9375965818075e42c4e8ff941f57902015409d81d4e96662e1508d12cfd68147c9f443cb9aaea35f4b6a968a5f5fa7be9893e81da5a2b1ba7262a20d7f00b7101eb7b5b25a68d8df90885881a1501a3a3d6c4ca24041bdf83f5e5c66e9c5d8aeb2b00ee87da754b1e3d6bd40fad3442bb8d22d6d10281b941a909337f0cba4f2a6610c588bb2649b70da4fa495d234d365cee6f70d38d4a06533c694af8c934a0841697fa4909a54bc265ca6b1268f7b80086cde5d15189071a4a7d8945f639e19e19cc1dee99bf3fd93e2728ea2e92869cded2a5baad0aedf4ce71731a1893e9b5e13b3fc8fd0d529a0f98638194e5f7acef6fe3e3e643b2a15fa41ad3264a407698f51312252e26ffababc25e8c87646312b9024f4b4229dbd8975c7f39c839b3b1be288ad86d755aac8214321848af31334a3b0b024788649a6d0d39e9bd6aabdcbf79084fa640d32d05c1dbac17fb2bff5a99029f08c154939c3147119f2995b67ed73247e08ccab160851e1cb152f1d39a31329dfcc0a8a2cf6c08ad5c3247c226a4dcb98ff1bc4561aa8ea3fa93acac14671249a659f4152c02533246323247efd0785bb0aee5827704f0b0e71129f109ed867295f248f283c3bcbe4ff49bf78d2a5053bb97bcd2563d74d7fcec6c6599c6af80c39712d1d0635acca57c7b6f0977dd404630df228d6289faa0ee7760619768fefd862cdf32b6bc17f1724c8e36db02f994aa2ba625ed9fa0e6c7b48becb1b8ee177728fda87f819c6fa1e20325d4f1ea04a7fa5563d13c5793b1e0d144c9afaf0e4c77df5c83d5667eb513d13ab0781f7eaf2114acf4483d8dbb8ce4d15ead13eda41382fa76e753754e559080db0fe6cc56514ed491aa4a13f3326dd3cd6e9975f5949bde5eed339850972d8d451c6791b2691048c5678496e670c99d81cff860b61bdd1d51b500a4e60e08d2baf49f42aede7c2f4204f7d61cf6fd6bf4eb58dea694abf013617a9b13121778e462d190d25e1c0231f7fe79dd1772c990ab099564a0ef5162f7c40263fd32ed54edf937d13c0c1b2d87a802016bebe0dc0528469a6c486c862bbe9a24040e5baaa10e49c0ecf74b441eb3cff1f91973072d8b01aff5a8306ae4d88284e180a9da4a772df0b54f2592ae14230b80b5a8df81fbd7f9756bc87deacf4148921b100dc7bc01a95c1042dd18ba5d2ba582b51d97bcd2200ec52f801a927e045481f8e483db3aec4fbf4459036eb8d8610f93d026510fa72fe9aa53cb7284c6a4f0965da5dc0fd0a117b0107635e3ca83e168994864eff64dd71e81ae24ee41c23043a5d0753834e3219ef8fdccfbcfe569a1d45afd6197417bae7654a3206cd275d49e3bcbe5a957f4300f2f12cd8de6ad49aa815e9239752d890bde5431c1a03e16a5493bfb52aa0199df06f257ae101199ff9d93522ce6690f6e60cdda35485abb5938b5d62c1ce44c5c3613d0c4160dfbe11c370092b36fbb07026ea86be98643c45be823bd814be6a442e0c5eeea7a47585a0e0e40c286b2805f53909e7b8a2c8620c82cb61b03ce51788bbeb8a9f4b3790bc5432e898ec6fff5092ca9b9db5eb7172b67fdc734b2ce21015a32904033b0d29a5362eaf83fc6f672109bdc86e484ba2bf90afc92bbe6ab5e246498e9ba460db42886affe9a8576f5ebf79bbd91e1b9c713110af9cc66bf3ce07a26948ef0b9bd194cb6de97854b721b51606644b1bb2753b3e5160c58c1679652daa6424237b0c1794435521e43c86264ba74f265121211fc4abdf3f08f743aa18b3dbfe59daaf1162fc7534edfabd966b7e2cc8d9fe04231a916ac136537e9d132b34ea6b2175b6bd80df7aed7d226e2dc8ef15eb3ad0a5eaeb5a0b2067c4cc0deb217efcef14dc3acd2aedd694543c220d7ce345292e04a4dddb439296254fb8a5c6631ae676298fe8889fa1013b0c2c6049e548755852f26d4d3e5b2c5fb26c32de38b4318da5ca5f79f96a7a3863cb3391a7e27ff8b09b2108bedda197e90508466668091256f76c50fa6b6eda7b67fa9f681030e5d8597f2dcb240d320907a51db289e8be722d63a79e6f93e4134fc1e7811cbf4", 0x1000, 0x6da}, {&(0x7f00000003c0)="61f4366b03cbce839c8f6ad8cb452e3b437103e81f46806291f546c9542792e645230d3bc902095ed3683fa1157db6fdd1cee3905ad6ded537cdbf501bdb7bbecf59b7268b017783ac578d00b685a4bc460751897297c0b35f081c27c0a45f0d8f253973bd45e67f8c38c07f07373decfef458602bc943f7c545b2b5", 0x7c, 0x1ff}, {&(0x7f0000001500)="a4bec7b45c4c150603979d5645b59fe785937f7d4be4bf0ee0d7c6d0c2e5bb8b87e7399fe1dbd6545b30e5ad07f13e7366d55ca88b9be1776c9270b6fa92758c363f4d8f6590ea406bb8fa1a7c0b862eac4840724516883174a550ab33230246473de7135ef1d1bc6d7dda6cd808f3540588af5689089be85371d17530cf4aab1e5794614ac12e0e049e27034579f197fcd5cb1558761637efa9c625fdb8109c48cd30612b7bbcbf3f1e2ea4d705c602dd131358a0ceffddf5f8dd9260be9c4e742295b4cf530bc3", 0xc8, 0x545}, {&(0x7f0000001d00)="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", 0x1000, 0x3}, {&(0x7f0000000300)="ff11460882fe02f57f361a99d99edf128a1d7104e88fb724", 0x18, 0x2}, {&(0x7f0000001600)="7dc7b55e30853770f1d74da8ecb2c4183079e74afe05fc699fa8ac1e33c09b26238dbf7c5be18fb0b36409d48afef1435582337418c696fb68d39f81a2ec99836bbb32a67f32141f6c975f147c3cec87cd46f935e50486c340ff87e0614b1f048556f8084fbc7da16d967fd9b16e92a4d87ad16e54f388f38421bfd0ac803117020890593990033d219461c4113a1d36bfde0abd93acb963b3ecc7bfc0bfe646916318ae1e36e802b7e2595e79e5c41020a1484fd23c9980db5c05c255a68295b7b58e082adc7f9f4652a81f209e1428f9ed3563b1202dac635f04363f9b49a7be096486fdc68d35829038911ca2531ceb1e6d", 0xf3, 0x3ff}, {&(0x7f0000001700)="faa59ca2b5cae15dbeb10d1d1ec6ff99f0a72159c550fd9a295efa9a259339559069e0d910cd80c84317fcc9eecb1d1da88f174989e9ca7f06f0978cfd63286e6ab8c462ceedc18debd9ff570db44a2d7ad63a8e7f01ba4241c493bd39241b3e8a985f006efef79525a3fe4594df619662f8593479a5b84a53aa3c799f5aaf2f883e418c5530cc82b4ba5f3104cf691d47a37c8ec48309571ea9c43d9e5459c6a7dcee88fcca1e8a46151f6c588b77c18f1fff1469ff10425365aa4d84", 0xbd, 0x7f}], 0x4, &(0x7f00000018c0)={[{@huge_advise}, {@nr_inodes={'nr_inodes', 0x3d, [0x78]}}, {@size={'size', 0x3d, [0x6b, 0x34, 0x6d, 0x74]}}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x32]}}}}, {@mode={'mode', 0x3d, 0x81}}, {@huge_always}], [{@pcr={'pcr', 0x3d, 0x39}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x36, 0x34, 0x32, 0x37, 0x32, 0x32, 0x30], 0x2d, [0x33, 0x64, 0x65, 0x34], 0x2d, [0x37, 0x38, 0x32, 0x63], 0x2d, [0x38, 0x62, 0x61, 0x39], 0x2d, [0x39, 0x66, 0x35, 0x63, 0x30, 0x39, 0x63, 0x64]}}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x38, 0x39, 0x39, 0x62, 0x30, 0x61], 0x2d, [0x39, 0x33, 0x0, 0x66], 0x2d, [0x66, 0x38, 0x34, 0x30], 0x2d, [0x33, 0x33, 0x30, 0x33], 0x2d, [0x66, 0x68, 0x32, 0x38, 0x36, 0x38, 0x31, 0x65]}}}, {@uid_eq={'uid', 0x3d, r1}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) keyctl$chown(0x4, 0x0, r1, r2) chown(&(0x7f0000000040)='./file0/file0\x00', r1, r3) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001c80)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f0000001b00)=[{&(0x7f00000019c0)=""/190, 0xbe}, {&(0x7f0000001a80)=""/99, 0x63}], 0x2, &(0x7f0000001b40)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb0}, 0x101) lstat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getegid() removexattr(&(0x7f0000002d00)='./file0/file0\x00', &(0x7f0000002d40)=@known='system.posix_acl_access\x00') setfsgid(r7) fsetxattr$security_capability(r5, &(0x7f0000002d80), &(0x7f0000002dc0)=@v1={0x1000000, [{0xfff, 0xfffffffe}]}, 0xc, 0x1) setgroups(0x8, &(0x7f0000002f40)=[r3, r3, r4, 0xee01, r3, r6, r3, r7]) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0/file0\x00') 14:47:44 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) [ 3050.016760] cgroup2: Unknown parameter 'ômw„ënjoä¦äýI±&CFO["—I+ªª°Ò…ÝÆÊ|„éªÂKôØNÌ¢üæåZ/¿4Ÿs‚Ô' ¦’™¦' 14:47:44 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$vcsa(&(0x7f0000000100), 0x6, 0x200000) ppoll(&(0x7f0000000080)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0x78) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r4, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept(r4, 0x0, &(0x7f0000000100)) splice(0xffffffffffffffff, &(0x7f0000000040)=0x43, r4, &(0x7f0000000140)=0xffffffffffffffff, 0x100000001, 0xa) splice(r3, 0x0, r1, 0x0, 0x7b, 0x0) 14:47:44 executing program 7: ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000001c0)={{0x2, 0x4e20, @empty}, {0x306, @local}, 0x28, {0x2, 0x4e22, @multicast1}, 'veth0_to_team\x00'}) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') recvmsg$unix(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0x6e, &(0x7f0000000700)=[{&(0x7f0000000440)=""/160, 0xa0}, {&(0x7f0000000500)=""/253, 0xfd}], 0x2, &(0x7f0000000600)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}, 0x200) flock(r1, 0x2) mount$cgroup(0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000680), 0x200200, 0x0) openat(r2, &(0x7f00000006c0)='./file0\x00', 0x10000, 0x1) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, r0, 0x0, 0xffffffff, 0x8f1, 0x4}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r3, 0x31e, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000240)={0x68, 0x29, 0x1, {0x6, [{{0x8, 0x0, 0x8}, 0x200, 0x2, 0x7, './file1'}, {{0x8, 0x4}, 0x0, 0x3f, 0x7, './file0'}, {{0x4, 0x3, 0x6}, 0x4000000000000, 0x40, 0x7, './file1'}]}}, 0x68) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$TIOCVHANGUP(r4, 0x5437, 0x0) sendfile(r4, r5, 0x0, 0x100000001) 14:48:01 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0x78) splice(r3, 0x0, r1, 0x0, 0x7b, 0x0) inotify_init() 14:48:01 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, 0x0, 0x86) 14:48:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, 0x0, &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:48:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, 0x0, 0x130) 14:48:01 executing program 3: sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x81}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[]) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x78000005, &(0x7f0000ff9000/0x4000)=nil) fstatfs(0xffffffffffffffff, &(0x7f00000002c0)=""/50) syz_open_dev$tty1(0xc, 0x4, 0x1) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="2f646576106e756c6c62347758e075523bbc3000"], &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='ext2\x00', 0x100000, &(0x7f0000000400)='.!.$[-\x00') mount$bind(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x1804404, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x1, 0x0) close(0xffffffffffffffff) 14:48:01 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:48:01 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) ioctl$TIOCNOTTY(r0, 0x5422) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r3, 0x31e, 0x0) ioctl$TIOCGRS485(r3, 0x542e, &(0x7f0000000180)) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r4 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008c08, &(0x7f0000000200)=ANY=[@ANYBLOB='mblk_io_submmt,bh,nojournal_checksum,sysvgroups,max_batch_time=0x000000000000007f,oldalloc,dont_appraise,permit_directio,\x00']) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:48:01 executing program 7: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x90101, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)={[{@subsystem='freezer'}]}) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000005c0)=""/101, 0x65}], 0x1, 0x61bf, 0x2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r2 = fsmount(r0, 0x1, 0x71) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r2, 0x3312, 0x8) r3 = openat(r2, &(0x7f0000000680)='./file0\x00', 0x1, 0x100) sendmsg$nl_generic(r3, &(0x7f0000000880)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)={0x140, 0x34, 0x2, 0x70bd2d, 0x25dfdbfb, {0x5}, [@typed={0x8, 0x6f, 0x0, 0x0, @ipv4=@empty}, @generic="64d186a42745ffd27883624a860309d996e04f8c8ff374f9a660d44e6df26ee3d9c2087b6c66ca2e062697", @nested={0x18, 0x1e, 0x0, 0x1, [@typed={0x14, 0x7e, 0x0, 0x0, @ipv6=@empty}]}, @generic="a52bb7a82ed58abed310bd83fc15f6a1f609b0d233c3264f5b55a7576971448c1a6c3c0b57ab446aff58c9a1d2971cdd4a6212f220ffa2eeeaa258b14d32000745c33bfceaea9d61bc8ba4d980e845497cff90", @generic="fae07cda19081ee59197cc0e043c8deef115029bdc97bb46d5c97971f97dbd3adde01c782513019adf3bb84ead65e7bf515d854f8d79d495de51d8b6db30bec05faa482ad30c569f78c87cb1e6038b6b3a7e880eb60aa2dc3f931cf1bde942c2482dd97d23a2aff275f2eb37831ee7788c8fb2daf0d438bba1f84b38fd7a0765601991f7c2cfa9c03d0d3980ff"]}, 0x140}, 0x1, 0x0, 0x0, 0x800}, 0x4) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000180)='./file1\x00', &(0x7f0000000200)='autofs\x00', 0x362801, &(0x7f0000000240)='.\x00') open_tree(0xffffffffffffff9c, &(0x7f0000000640)='./file0/file0\x00', 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x81) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="e80100003b00100025bd7000ffdbdf251b00000021017f80dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf08000900", @ANYRES32, @ANYBLOB='\b\x00;\x00', @ANYRES32, @ANYBLOB="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04a9530d3eea12529e839c8ab70000003e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"], 0x1e8}}, 0x4008040) umount2(&(0x7f0000000000)='./file1\x00', 0x6) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f00000008c0)={0xa0, 0x40}) ftruncate(r1, 0x3ff) 14:48:01 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4, 0x7}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:48:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, 0x0, 0x130) [ 3066.675764] tmpfs: Unknown parameter '/devnullb4wXàuR;¼0' 14:48:19 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000380)=""/186) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(r3, r0, &(0x7f0000000140)=0x7, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x110) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000200)=ANY=[@ANYRES64=r0, @ANYRES32=r2, @ANYBLOB="00000000000000002e2f66696c6530004f3373c2f9c62dd629892577ceb0da43aa021b9f067f2c0d1cf013c370092fc4b673b3f47e686d7095f4f90732ad48aa233aaf89ea32"]) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x900000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, 0x13, 0x800, 0x70bd26, 0x25dfdbfc, {0x1e, 0x4, 0x0, 0x0, {0x4e21, 0x4e24, [0x0, 0x0, 0x101, 0x5], [0x3, 0x28074b5b, 0xb, 0x8], 0x0, [0x1, 0x400]}, 0x10001, 0x7}}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x80c0) socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f00000000c0)={0x0, r1, 0x7fff, 0x6, 0x2, 0x2}) perf_event_open(&(0x7f0000000000)={0x6, 0x80, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:48:19 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) r2 = syz_open_dev$vcsn(&(0x7f0000000200), 0x400, 0x101000) openat(r2, &(0x7f0000000240)='./file1\x00', 0xa2880, 0x20) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r3 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r4 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r3, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) openat(r1, &(0x7f0000000180)='./file1\x00', 0x84000, 0x4c) 14:48:19 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x78) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x7b, 0x0) ioctl$FIONCLEX(r0, 0x5450) recvmmsg(r1, &(0x7f0000006e80)=[{{&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000001680)=[{&(0x7f0000000180)=""/80, 0x50}, {&(0x7f0000000200)=""/173, 0xad}, {&(0x7f00000002c0)=""/186, 0xba}, {&(0x7f0000000380)=""/192, 0xc0}, {}, {&(0x7f0000000440)=""/187, 0xbb}, {&(0x7f0000000500)=""/199, 0xc7}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/123, 0x7b}], 0x9, &(0x7f0000001740)=""/253, 0xfd}, 0x8}, {{&(0x7f0000001840)=@hci, 0x80, &(0x7f0000000080)=[{&(0x7f00000018c0)=""/163, 0xa3}], 0x1}, 0x20}, {{&(0x7f0000001980)=@hci, 0x80, &(0x7f0000001d00)=[{&(0x7f0000001a00)=""/30, 0x1e}, {&(0x7f0000001a40)=""/190, 0xbe}, {&(0x7f0000001b00)=""/255, 0xff}, {&(0x7f0000001c00)=""/214, 0xd6}], 0x4, &(0x7f0000001d40)=""/136, 0x88}, 0x4}, {{&(0x7f0000001e00)=@l2tp={0x2, 0x0, @empty}, 0x80, &(0x7f0000004180)=[{&(0x7f0000001e80)=""/18, 0x12}, {&(0x7f0000001ec0)=""/254, 0xfe}, {&(0x7f0000001fc0)=""/181, 0xb5}, {&(0x7f0000002080)=""/72, 0x48}, {&(0x7f0000002100)=""/72, 0x48}, {&(0x7f0000002180)=""/4096, 0x1000}, {&(0x7f0000003180)=""/4096, 0x1000}], 0x7, &(0x7f0000004200)=""/24, 0x18}}, {{&(0x7f0000004240)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000004480)=[{&(0x7f00000042c0)=""/103, 0x67}, {&(0x7f0000004340)=""/63, 0x3f}, {&(0x7f0000004380)=""/69, 0x45}, {&(0x7f0000004400)=""/116, 0x74}], 0x4, &(0x7f00000044c0)=""/146, 0x92}, 0x6}, {{&(0x7f0000004580)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000004a00)=[{&(0x7f0000004600)=""/94, 0x5e}, {&(0x7f0000004680)=""/161, 0xa1}, {&(0x7f0000004740)=""/24, 0x18}, {&(0x7f0000004780)=""/239, 0xef}, {&(0x7f0000004880)=""/107, 0x6b}, {&(0x7f0000004900)=""/229, 0xe5}], 0x6}, 0x1}, {{&(0x7f0000004a80)=@nl=@unspec, 0x80, &(0x7f0000004f00)=[{&(0x7f0000004b00)=""/189, 0xbd}, {&(0x7f0000004bc0)=""/236, 0xec}, {&(0x7f0000004cc0)=""/209, 0xd1}, {&(0x7f0000004dc0)=""/152, 0x98}, {&(0x7f0000004e80)=""/117, 0x75}], 0x5, &(0x7f0000004f80)=""/30, 0x1e}, 0x400}, {{&(0x7f0000004fc0)=@ieee802154={0x24, @long}, 0x80, &(0x7f00000054c0)=[{&(0x7f0000005040)=""/220, 0xdc}, {&(0x7f0000005140)=""/181, 0xb5}, {&(0x7f0000005200)=""/156, 0x9c}, {&(0x7f00000052c0)=""/41, 0x29}, {&(0x7f0000005300)=""/79, 0x4f}, {&(0x7f0000005380)=""/27, 0x1b}, {&(0x7f00000053c0)=""/50, 0x32}, {&(0x7f0000005400)=""/143, 0x8f}], 0x8, &(0x7f0000005540)=""/27, 0x1b}, 0x40}, {{0x0, 0x0, &(0x7f0000005a00)=[{&(0x7f0000005580)=""/159, 0x9f}, {&(0x7f0000005640)=""/67, 0x43}, {&(0x7f00000056c0)=""/2, 0x2}, {&(0x7f0000005700)=""/24, 0x18}, {&(0x7f0000005740)=""/153, 0x99}, {&(0x7f0000005800)=""/218, 0xda}, {&(0x7f0000005900)=""/212, 0xd4}], 0x7}, 0x7}, {{&(0x7f0000005a80)=@nfc_llcp, 0x80, &(0x7f0000006e00)=[{&(0x7f0000005b00)=""/4096, 0x1000}, {&(0x7f0000006b00)=""/92, 0x5c}, {&(0x7f0000006b80)=""/239, 0xef}, {&(0x7f0000006c80)=""/131, 0x83}, {&(0x7f0000006d40)=""/92, 0x5c}, {&(0x7f0000006dc0)}], 0x6}, 0x2}], 0xa, 0x20, 0x0) lseek(r2, 0x3, 0x1) 14:48:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:48:19 executing program 3: preadv2(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000080)=""/170, 0xaa}, {&(0x7f0000000140)=""/235, 0xeb}, {&(0x7f0000000240)=""/162, 0xa2}], 0x3, 0x101, 0x3, 0xb) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x240900, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000040)={0x7}, 0x7) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) 14:48:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, 0x0, 0x130) 14:48:19 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4, 0x300}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:48:19 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, 0x0, 0x86) 14:48:19 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) ioctl$TIOCNOTTY(r0, 0x5422) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r3, 0x31e, 0x0) ioctl$TIOCGRS485(r3, 0x542e, &(0x7f0000000180)) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r4 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008c08, &(0x7f0000000200)=ANY=[@ANYBLOB='mblk_io_submmt,bh,nojournal_checksum,sysvgroups,max_batch_time=0x000000000000007f,oldalloc,dont_appraise,permit_directio,\x00']) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:48:19 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x0) 14:48:19 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4, 0x700}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:48:19 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r1 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/bus/input/devices\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r2 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)=ANY=[@ANYBLOB='norecovery,barrier=0x00000000000,nojournal_checksum,syd,dax,dont_appraise,permit_directio,\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r1, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:48:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[], 0x130) 14:48:19 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = accept(r0, 0x0, &(0x7f0000000100)) recvmmsg(r1, &(0x7f00000019c0)=[{{&(0x7f0000000140)=@isdn, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, &(0x7f0000000280)=""/144, 0x90}, 0x6}, {{&(0x7f0000000340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)=""/179, 0xb3}, {&(0x7f0000000480)=""/66, 0x42}, {&(0x7f0000000500)=""/152, 0x98}, {&(0x7f00000005c0)=""/101, 0x65}, {&(0x7f0000000640)=""/4096, 0x1000}], 0x5, &(0x7f00000016c0)=""/203, 0xcb}, 0x8001}, {{&(0x7f00000017c0)=@can, 0x80, &(0x7f0000001840)}, 0x4}, {{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001880)=""/108, 0x6c}, {&(0x7f0000001900)=""/29, 0x1d}], 0x2, &(0x7f0000001980)=""/10, 0xa}, 0x10001}], 0x4, 0x20, &(0x7f0000001ac0)={0x0, 0x3938700}) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4c265, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x81, 0xe03}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, 0x1}, 0x0, 0x4, r2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) openat(r2, &(0x7f0000000080)='./file0\x00', 0x80800, 0x44) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r4, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = accept(r4, 0x0, &(0x7f0000000100)) recvmmsg(r5, &(0x7f00000019c0)=[{{&(0x7f0000000140)=@isdn, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, &(0x7f0000000280)=""/144, 0xf8}, 0x6}, {{&(0x7f0000000340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000001640), 0x5, &(0x7f0000001b00)=""/203, 0xcb}, 0x8001}, {{&(0x7f00000017c0)=@can, 0x80, &(0x7f0000001840)}, 0xffff}, {{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001880)=""/108, 0x6c}, {&(0x7f0000001900)=""/29, 0x1d}], 0x2, &(0x7f0000001980)=""/10, 0xa}, 0x10001}], 0x4, 0x20, &(0x7f00000000c0)={0x0, 0x3938700}) sendfile(r3, r5, &(0x7f0000000000)=0x2, 0xffffffffffff0001) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r3, 0x0) fork() 14:48:20 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a2649cc55aa09997b19022ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89275c29c7decb81fb950000000040ddb827b44d010c05a5c98e52702b059eac222eecbad64abf414366a40197eedcfb2181ed287fad9c290de202b64349f90652599f5e5502d5904084eb98ef37f66802e57c187ad97551d2037eb89eb8e26cc6127a28b406a5e9949a381bdf78028030bf89fd805a0c9ac7798552125b8581902a347753c1a6272a382ee89fab33af8d2e27ae4ce599e6e84fcf15", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x0) 14:48:20 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4, 0xa1b}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:48:20 executing program 3: r0 = mmap$IORING_OFF_SQES(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000004, 0x10, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x800) r1 = syz_io_uring_setup(0x349b, &(0x7f0000000040)={0x0, 0x5c89, 0x20, 0x3, 0x380}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000140)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}, 0x64) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000001, 0x110, r1, 0x0) syz_io_uring_submit(r4, r0, &(0x7f00000001c0)=@IORING_OP_SEND={0x1a, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000180)="8922c8d4b3af46743f9933f0370b14e3fb38717bbc17175e8a5dd9db8a0dad4171c127145e354fbe929e9b477b1b831c1a045e56490a393cd1c76cace669", 0x3e, 0x50}, 0x3ff) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x480002, 0x0) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240), 0x20c40, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000280)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd=r5, 0x8, {0x0, r6}, 0xc9, 0x4, 0x1, {0x0, 0x0, r1}}, 0x7) io_uring_enter(r1, 0x5005, 0x77de, 0x0, &(0x7f00000002c0)={[0x101]}, 0x8) r7 = syz_mount_image$nfs4(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0xcb14, 0x3, &(0x7f0000000480)=[{&(0x7f0000000380)="d863697112b5a6c0e14d25cf7e4c13cb0fa77b0f44504efc22b85992aa3ecba78f11677a6e6e21ac9c35f6cb111a34032882129a6e782e1c2bab7f6d9523b4216304d3f9d665cf970a856584d3b48ca4c874ad4134b1e4fe006789b5e26b05b6be51a834e66fae4985fa5014411ef10feb4c06393b591b2f", 0x78, 0x900000000000}, {&(0x7f0000000400)="d99529dc146a37eb054af3cd82fa96ad009b52ebcf5412337a0170dd80597c4f4490bc8104fe38076fbd1ee2392acad8", 0x30, 0x7}, {&(0x7f0000000440), 0x0, 0x1}], 0x0, &(0x7f0000000500)={[{}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@obj_type={'obj_type', 0x3d, '$!{'}}]}) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, r3, &(0x7f0000000540)=@IORING_OP_WRITE_FIXED={0x5, 0x4, 0x4007, @fd=r7, 0x3, 0x805d, 0xffffffff, 0x1a, 0x0, {0x2, r8}}, 0x3) write$vga_arbiter(r5, &(0x7f0000000580)=@other={'decodes', ' ', 'io+mem'}, 0xf) syz_io_uring_submit(r2, r0, &(0x7f00000005c0)=@IORING_OP_NOP={0x0, 0x5}, 0x80) inotify_add_watch(r5, &(0x7f0000000600)='./file0\x00', 0x86) flock(r7, 0x4) ioctl$VFAT_IOCTL_READDIR_BOTH(r7, 0x82307201, &(0x7f0000000640)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r9 = syz_open_dev$vcsn(&(0x7f0000000880), 0xffffffffffffff7f, 0x200000) io_uring_register$IORING_REGISTER_FILES(r9, 0x2, &(0x7f0000000940)=[r1, 0xffffffffffffffff, r7], 0x3) 14:48:20 executing program 7: pipe2(&(0x7f00000000c0), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 14:48:35 executing program 3: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r3, 0x0, 0x0) r4 = open$dir(&(0x7f0000000140)='./file0\x00', 0x101000, 0x20) r5 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x464a80, 0x0) sendfile(r4, r5, 0x0, 0xfffffffffffffffd) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept(r3, 0x0, &(0x7f0000000100)) close(r3) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x40) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) recvmmsg(r6, &(0x7f00000019c0)=[{{&(0x7f0000000140)=@isdn, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, &(0x7f0000000280)=""/144, 0x90}, 0x6}, {{&(0x7f0000000340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)=""/179, 0xb3}, {&(0x7f0000000480)=""/66, 0x42}, {&(0x7f0000000500)=""/152, 0x98}, {&(0x7f00000005c0)=""/101, 0x65}, {&(0x7f0000000640)=""/4096, 0x1000}], 0x5, &(0x7f00000016c0)=""/203, 0xcb}, 0x8001}, {{&(0x7f00000017c0)=@can, 0x80, &(0x7f0000001840)}, 0x4}, {{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001880)=""/108, 0x6c}, {&(0x7f0000001900)=""/29, 0x1d}], 0x2, &(0x7f0000001980)=""/10, 0xa}, 0x10001}], 0x4, 0x20, &(0x7f0000001ac0)={0x0, 0x3938700}) sendfile(0xffffffffffffffff, r6, &(0x7f0000000240)=0x4, 0xfffffffffffffd68) r7 = eventfd2(0x0, 0x800) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r7, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) 14:48:35 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r2 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r2, 0x5609, 0x0) r3 = creat(0x0, 0x1) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r4 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r3, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:48:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:48:35 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0x78) splice(r3, 0x0, r1, 0x0, 0x8000000007b, 0x0) 14:48:35 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[], 0x130) 14:48:35 executing program 7: r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r1, 0x1000003) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}, 0x10}, 0x0, 0xfffffffffffbffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 14:48:35 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x0) 14:48:35 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4, 0x1b0a}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:48:35 executing program 3: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x0) r1 = memfd_create(&(0x7f0000000000)='\x00', 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_READ_FIXED={0x4, 0x4, 0x2004, @fd=r1, 0x8, 0xb7e3, 0x8, 0x8, 0x0, {0x3}}, 0x8001) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_POLL_REMOVE={0x7, 0x5, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}, 0x8) pwritev2(r1, &(0x7f0000000140)=[{&(0x7f0000000040)='e', 0x1}], 0x1, 0x100009, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r2 = memfd_create(&(0x7f00000002c0)='\x00', 0x6) add_key$fscrypt_v1(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}}, 0x0, 0x5, 0xffffffffffffffff, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x100000000, 0x0) r4 = epoll_create(0x83) r5 = perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x4}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000300)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB="960090bb56fcdcaf430266696c653000"]) copy_file_range(r5, &(0x7f00000000c0)=0xfffffffffffffffc, r6, 0x0, 0x1000, 0x0) pread64(r2, &(0x7f00000001c0)=""/194, 0xc2, 0x1) epoll_pwait(0xffffffffffffffff, &(0x7f0000000180)=[{}], 0x1, 0x0, 0x0, 0x0) 14:48:35 executing program 7: r0 = socket$inet(0x2, 0x3, 0x80) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'sit0\x00', {0x2, 0x0, @initdev}}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="80", 0x1}], 0x1}, 0x4000004) sendmmsg$inet(r0, &(0x7f0000000000), 0x400000d, 0x0) 14:48:35 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000180)=0x4) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x404000, 0x4e) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:48:35 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4, 0xff01}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:48:35 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[], 0x130) 14:48:35 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 1) 14:48:35 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='uslloc,\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00']) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x1000003, 0xffffffffffffffff) pwritev2(0xffffffffffffffff, 0x0, 0xfffffffffffffec6, 0x6, 0x0, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) recvmmsg(r1, &(0x7f00000019c0)=[{{&(0x7f0000000140)=@isdn, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, &(0x7f0000000280)=""/144, 0x90}, 0x6}, {{&(0x7f0000000340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)=""/179, 0xb3}, {&(0x7f0000000480)=""/66, 0x42}, {&(0x7f0000000500)=""/152, 0x98}, {&(0x7f00000005c0)=""/101, 0x65}, {&(0x7f0000000640)=""/4096, 0x1000}], 0x5, &(0x7f00000016c0)=""/203, 0xcb}, 0x8001}, {{&(0x7f00000017c0)=@can, 0x80, &(0x7f0000001840)}, 0x4}, {{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001880)=""/108, 0x6c}, {&(0x7f0000001900)=""/29, 0x1d}], 0x2, &(0x7f0000001980)=""/10, 0xa}, 0x10001}], 0x4, 0x20, &(0x7f0000001ac0)={0x0, 0x3938700}) sendmsg$IPSET_CMD_PROTOCOL(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x4c, 0x1, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc000}, 0x24008001) pkey_mprotect(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0xc, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) [ 3100.817973] FAULT_INJECTION: forcing a failure. [ 3100.817973] name failslab, interval 1, probability 0, space 0, times 0 [ 3100.820664] CPU: 1 PID: 14193 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3100.822087] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3100.823749] Call Trace: [ 3100.824285] dump_stack+0x107/0x167 [ 3100.825032] should_fail.cold+0x5/0xa [ 3100.825802] ? getname_flags.part.0+0x50/0x4f0 [ 3100.826718] should_failslab+0x5/0x20 [ 3100.827488] kmem_cache_alloc+0x5b/0x360 [ 3100.828307] getname_flags.part.0+0x50/0x4f0 [ 3100.829212] ? wait_for_completion_io+0x270/0x270 [ 3100.830199] getname_flags+0x9a/0xe0 [ 3100.830956] do_mkdirat+0x8d/0x2a0 [ 3100.831680] ? user_path_create+0xf0/0xf0 [ 3100.832543] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3100.833604] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3100.834660] do_syscall_64+0x33/0x40 [ 3100.835420] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3100.836461] RIP: 0033:0x7f4c4e303b19 [ 3100.837225] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3100.840949] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3100.842493] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3100.843935] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3100.845383] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3100.846832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3100.848272] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 [ 3100.924778] EXT4-fs (loop7): Unrecognized mount option "uslloc" or missing value 14:48:50 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "3777bec46cadbec271ef1a0c69089f0d25ae7e7eef5c3a9c2b7a75238240879af13fa9a798e9414746c82eeed7c3f61051ead3fd4f7852fc8398ced850c9faa4a7a4362f97e73a13b24a40d6b0c43dd359291244538f69e9f69f8d4235d6f87e205032e1fd6a33d9c2ad298732eac946a3c526c60bfccffde72b341101c6b716b285b64d9d48359c351b9c960d5e98a3e7705b2f1709a04425eea4914a3e19b8c51bfa05ee967a769b2e8f29313bdc98539e92d6bbddedb92a7367b3c4a90000e595f3469efc0873f277db1bfce53714129dbbb15961bf618a48771abbef15e4e54aa8fe83deda7b230c9613af597bd8d2cf95c827862926aa3c1fb38092"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x130) 14:48:50 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0x78) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r4, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = accept(r4, 0x0, &(0x7f0000000100)) recvmmsg(r5, &(0x7f00000019c0)=[{{&(0x7f0000000140)=@isdn, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, &(0x7f0000000280)=""/144, 0x90}, 0x6}, {{&(0x7f0000000340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)=""/179, 0xb3}, {&(0x7f0000000480)=""/66, 0x42}, {&(0x7f0000000500)=""/152, 0x98}, {&(0x7f00000005c0)=""/101, 0x65}, {&(0x7f0000000640)=""/4096, 0x1000}], 0x5, &(0x7f00000016c0)=""/203, 0xcb}, 0x8001}, {{&(0x7f00000017c0)=@can, 0x80, &(0x7f0000001840)}, 0x4}, {{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001880)=""/108, 0x6c}, {&(0x7f0000001900)=""/29, 0x1d}], 0x2, &(0x7f0000001980)=""/10, 0xa}, 0x10001}], 0x4, 0x20, &(0x7f0000001ac0)={0x0, 0x3938700}) recvmmsg$unix(r1, &(0x7f0000001bc0)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000100)=""/120, 0x78}, {&(0x7f0000000180)=""/103, 0x67}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000001280)=""/172, 0xac}, {&(0x7f0000001340)=""/78, 0x4e}, {&(0x7f0000000080)=""/43, 0x2b}, {&(0x7f00000013c0)=""/15, 0xf}, {&(0x7f0000001400)=""/110, 0x6e}, {&(0x7f0000001480)=""/204, 0xcc}], 0xa, &(0x7f0000001640)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x78}}, {{0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000016c0)=""/182, 0xb6}, {&(0x7f0000001780)=""/197, 0xc5}, {&(0x7f0000001880)=""/176, 0xb0}, {&(0x7f0000001940)=""/196, 0xc4}], 0x4, &(0x7f0000001a80)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x128}}], 0x2, 0x10001, &(0x7f0000001c40)={0x77359400}) connect$inet6(r7, &(0x7f0000001c80)={0xa, 0x4e21, 0x9, @mcast2, 0x3507}, 0x1c) fchown(r5, 0xee00, r6) splice(r3, 0x0, r1, 0x0, 0x7b, 0x0) 14:48:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:48:50 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x26, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c20000120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32393036373937313100"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040000c00000000000000e1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000005d00000000000000", 0x40, 0x540}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000e1f4655fe1f4655fe1f4655f00"/8224, 0x2020, 0x2000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x4400}, {&(0x7f0000012700)="20000000e42a2b4ce42a2b4c00000000e1f4655f00"/32, 0x20, 0x4480}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030000000", 0x40, 0x4800}, {&(0x7f0000012900)="20000000000000000000000000000000e1f4655f00"/32, 0x20, 0x4880}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040000000", 0x40, 0x4c00}, {&(0x7f0000001b00)="20000000000000000000000000000000e1f4655f00"/32, 0x20, 0x1}, {&(0x7f0000012c00)="c041000000300000e1f4655fe1f4655fe1f4655f00000000000002008000000000000800000000000af301000400000000000000000000000300000020000000", 0x40, 0x6800}, {&(0x7f0000012d00)="20000000000000000000000000000000e1f4655f000000000000000000000000000002ea00"/64, 0x40, 0x6880}, {&(0x7f0000001f40)="ed4100003c000000e201f4655fe2f4655fe2f4655f0000000000000200000000000000040000000000020000000d0000001000050100696c65300000000e0000002800050766696c65310000000000000000000000e6400aaf0000000000000000000000000000000045102290000000f1f600000000000000000000000000000000000000200000e7e32a2b4ce42a2b4ce42a2b4ce2f4655fe40a2b4c000000000000000000000aea0407000000000000000000000000000064617461000000000000009f8ef0bf97a468768c560b20ec3f3472c0f2553043280dc146be", 0xde, 0x6c00}, {&(0x7f0000012f00)="ed8100001a040000e2f4655fe2f4655fe2f4655f00000000000001008000000000000800010000000af301000400000000000000000000000100000050000000000000000000000000000000000000000000000000000000000000000000000000000000682546cf00000000000000000000000000000000000000000000000020000000e42a2b4ce42a2b4ce42a2b4ce2f4655fe42a2b4c0000000000000000", 0xa0, 0x7000}, {&(0x7f0000013000)="ffa1000026000000e2f4655fe2f4655fe2f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3239303637393731312f66696c65302f66696c653000000000000000000000000000000000000000000000edc75b2500000000000000000000000000000000000000000000000020000000e42a2b4ce42a2b4ce42a2b4ce2f4655fe42a2b4c0000000000000000", 0xa0, 0x7400}, {&(0x7f0000013100)="ed8100000a000000e2f4655fe2f4655fe2f4655f000000000000010000000000000000100100000073797a6b616c6c6572730000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000514905cf00000000000000000000000000000000000000000000000020000000e42a2b4ce42a2b4ce42a2b4ce2f4655fe42a2b4c0000000000000000000002ea040700000000000000000000000000006461746106015403000000000600000000000000786174747231000006014c0300000000060000000000000078617474723200"/256, 0x100, 0x7800}, {&(0x7f0000013200)="0000000000000000000000000000000078617474723200007861747472310000ed81000028230000e2f4655fe2f4655fe2f4655f00000000000002008000000000000800010000000af301000400000000000000000000000300000060000000020000000100000062000000020000000180000062000000000000000000000000000000c183a18a00000000000000000000000000000000000000000000000020000000e42a2b4ce42a2b4ce42a2b4ce2f4655fe42a2b4c0000000000000000", 0xc0, 0x7be0}, {&(0x7f0000013300)="ed81000064000000e2f4655fe2f4655fe2f4655f000000000000010000000000000000100100000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c242da44300000000000000000000000000000000000000000000000020000000e42a2b4ce42a2b4ce42a2b4ce2f4655fe42a2b4c0000000000000000000002ea04073403000000002800000000000000646174610000000000000000", 0xc0, 0x8000}, {&(0x7f0000013400)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00lersyzkallersyzkallersyzkallersyzkallers', 0x40, 0x83c0}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c653300000011000000940f090166696c652e636f6c64000000", 0x80, 0x10000}, {&(0x7f0000013600)="0b0000000c0001022e000000020000000c0002022e2e000000000000e80f0000", 0x20, 0x20000}, {&(0x7f0000013700)="00000000001000"/32, 0x20, 0x4021000}, {&(0x7f0000013800)="00000000001000"/32, 0x20, 0x22000}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x30000}, {&(0x7f0000013a00)="0200"/32, 0x20, 0x30400}, {&(0x7f0000013b00)="0300"/32, 0x20, 0x30800}, {&(0x7f0000013c00)="0400"/32, 0x20, 0x30c00}, {&(0x7f0000013d00)="0500"/32, 0x20, 0x800000031000}, {&(0x7f0000001ec0)="0000000000000000010000001d0000fa466b2f66a1938d547d1bba1908805beef8876ca8e400000000087789e903d57100000000000000000054f47898cae1837900000000080000000000000000000000000000000000000000000000000004", 0x60, 0x31400}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x40000}, {&(0x7f0000014000)="0200"/32, 0x20, 0x40400}, {&(0x7f0000001d00)="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", 0x1b2, 0x40800}, {&(0x7f0000014200)="0400"/32, 0x20, 0x40c00}, {&(0x7f0000014300)="0500"/32, 0x20, 0x41000}, {&(0x7f0000001b40)="000000000000000001000000000000000000000000000000260c397d0d93305857660addaae25f690000000000000000000000000000000008000000000000000000000000000000000000000000000000000400000000000000000000000000b937e1fd1c97f8f0a649fed5018fdca51417412c8ad17460ac9a7bbc7b51f9512649290551d23e3bac", 0x89, 0x41400}, {&(0x7f0000014500)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x50000}], 0x0, &(0x7f0000001ac0)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x8, 0x101}}, './file0\x00'}) r2 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x31e, 0x0) openat(r2, &(0x7f0000002140)='./file0\x00', 0x105001, 0x0) stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x220) name_to_handle_at(r1, &(0x7f0000001c80)='./file0\x00', &(0x7f0000002040)=@reiserfs_3={0xc, 0x3, {0x7, 0xcf, 0x10}}, &(0x7f0000002080), 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) r4 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000140)='.\x00', 0x7, 0x7, &(0x7f0000001800)=[{&(0x7f00000005c0)="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", 0x1000, 0xb8}, {&(0x7f0000000180)="4aa71dbbb2ac161e3a4945986b06c1349b", 0x11, 0x1}, {&(0x7f00000015c0)="a2badfe623bd346753d661380448c7e9c1341b97e325c932313f5bd465bbb7748bc2834796aec98d78a64b08adde40981c3ba7e27963be8ba8635eec8813773ee99d9603a28186de3402cc5efd36b82c344ca4d18edbae36448bff7dd1305f4900f7bdcc32ffbde01ae24688c9b40d905379e896f6e8de9da41db47b87e95d216a03a8e1980a968b6e296ae60f609a7c25c041d7e94cb1d0a5a3bdf0c14e6bbee5886ba36463f5ada60ae7cdf133f9aa8a3a0621ad5cd828a3400c62bc3330015686920bf78b8926336812d251aa37501498", 0xd2}, {&(0x7f00000001c0)="bfd9ae1b18228a230681931a062db0e1dd1e07d65c087f1a9a1f274fa93e022a9ca979788e72b8e8c903e1b0c6c243c70f6e512051fb95324152b079feb89e", 0x3f, 0x3}, {&(0x7f00000016c0)="1ca8309ad6612dc29a211829696e61398b9f6d4f1e", 0x15, 0xa79}, {&(0x7f0000001700)="65da51e78f7cda4c863fbba3b730f3f11ff20f8a781fd29d10", 0x19, 0x2}, {&(0x7f0000001740)="6c6b674be00364c31a9da3dc3afea9df4333597723f44b7ff4dd0faed502c9eff4055dcd73274fb0489f49b4ef0e2f46e38c92f44d671277540f1e7c1292e413ab061574083d0a17f6edab150c9d859561d0aac632ba353132beb1c7e505fe71202b476420a5a9ed143428033db8c5f60eed0b08c66a511bd4cd589f5fbc4ac2074c0c906a22bf5e933a65b9bd9115103b64857cdaeca3f1520affa135fb7b7095ac1f0880bb106a08025bb3dd873a70b4e882eddd33551096", 0xb9, 0x2}], 0x1840804, &(0x7f00000018c0)={[{@uni_xlateno}], [{@dont_appraise}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@euid_lt={'euid<', r3}}]}) fstat(r0, &(0x7f00000020c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r6, 0x0) setresuid(r5, r3, r6) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000001a00)={{0x1, 0x1, 0x18, r4, {0x3}}, './file0\x00'}) bind(r7, &(0x7f0000001a40)=@ethernet={0x6, @multicast}, 0x80) 14:48:50 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) r3 = perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r4 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)=ANY=[@ANYBLOB="6e6c7265636f766572792c626172726987723d3078303030303030303030303030303030302c6e6f6a6f75726e616c5fe36865636b73756d2c7379737667726f7570732c64696f636172642c6461782c646f6e745f61707072616973652c7065726d69745f646972656374696f2c00"]) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) r5 = fork() r6 = fork() r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) kcmp(r5, r6, 0x5, r7, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xd0, 0x0, 0x0, 0x40, 0x0, 0x9, 0x84000, 0xc, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1000, 0x1, @perf_bp={&(0x7f0000000180)}, 0x80, 0x9, 0x4, 0x4, 0x1, 0x4778, 0x0, 0x0, 0x80, 0x0, 0x800}, r5, 0x6, r3, 0x1) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:48:50 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 2) 14:48:50 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) pkey_alloc(0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r1) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r1) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000010000001800000081b47a84395bd965002997166cdf11aa30f4393a3302ec2303b0ccd461ef5eb44cca95e41717f9085f454308f4bc364c9a62fa85ecede308463fad4c5f4a58923aff1896061bb17e442306c1e06b8f75524d17154b8b62912aaf647eff797c72", @ANYRES32=r0, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file0\x00']) perf_event_open(0x0, 0x0, 0x4, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, r5) creat(&(0x7f0000000100)='./file0\x00', 0x26) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r4, r3, 0x0, 0x9bbb) 14:48:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4, 0xff7f}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) [ 3115.562049] FAULT_INJECTION: forcing a failure. [ 3115.562049] name failslab, interval 1, probability 0, space 0, times 0 [ 3115.562070] CPU: 0 PID: 14217 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3115.562080] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 14:48:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001300)={0x14, 0x12, 0xc21}, 0x14}}, 0x0) [ 3115.562086] Call Trace: [ 3115.562108] dump_stack+0x107/0x167 [ 3115.562132] should_fail.cold+0x5/0xa [ 3115.562159] ? create_object.isra.0+0x3a/0xa20 [ 3115.562180] should_failslab+0x5/0x20 [ 3115.562197] kmem_cache_alloc+0x5b/0x360 [ 3115.562213] ? ksys_write+0x21a/0x260 [ 3115.562236] create_object.isra.0+0x3a/0xa20 [ 3115.562254] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3115.562278] kmem_cache_alloc+0x159/0x360 [ 3115.562302] getname_flags.part.0+0x50/0x4f0 14:48:50 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "3777bec46cadbec271ef1a0c69089f0d25ae7e7eef5c3a9c2b7a75238240879af13fa9a798e9414746c82eeed7c3f61051ead3fd4f7852fc8398ced850c9faa4a7a4362f97e73a13b24a40d6b0c43dd359291244538f69e9f69f8d4235d6f87e205032e1fd6a33d9c2ad298732eac946a3c526c60bfccffde72b341101c6b716b285b64d9d48359c351b9c960d5e98a3e7705b2f1709a04425eea4914a3e19b8c51bfa05ee967a769b2e8f29313bdc98539e92d6bbddedb92a7367b3c4a90000e595f3469efc0873f277db1bfce53714129dbbb15961bf618a48771abbef15e4e54aa8fe83deda7b230c9613af597bd8d2cf95c827862926aa3c1fb38092"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x130) [ 3115.562321] ? wait_for_completion_io+0x270/0x270 [ 3115.562341] getname_flags+0x9a/0xe0 [ 3115.562359] do_mkdirat+0x8d/0x2a0 [ 3115.562378] ? user_path_create+0xf0/0xf0 [ 3115.562402] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 14:48:50 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a2649cc55aa09997b19022ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89275c29c7decb81fb950000000040ddb827b44d010c05a5c98e52702b059eac222eecbad64abf414366a40197eedcfb2181ed287fad9c290de202b64349f90652599f5e5502d5904084eb98ef37f66802e57c187ad97551d2037eb89eb8e26cc6127a28b406a5e9949a381bdf78028030bf89fd805a0c9ac7798552125b8581902a347753c1a6272a382ee89fab33af8d2e27ae4ce599e6e84fcf15", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 3) [ 3115.562419] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3115.562444] do_syscall_64+0x33/0x40 [ 3115.562464] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3115.562476] RIP: 0033:0x7f4c4e303b19 [ 3115.562494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 14:48:50 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000200)='./file1\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(&(0x7f0000000100)='./file1\x00', &(0x7f00000001c0)=""/37, 0x25) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 14:48:50 executing program 3: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x4c}], 0x1}}], 0x7ffff000, 0x0) [ 3115.562504] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3115.562524] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3115.562534] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3115.562544] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3115.562554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3115.562565] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 [ 3115.809658] ieee802154 phy0 wpan0: encryption failed: -22 [ 3115.813080] FAULT_INJECTION: forcing a failure. [ 3115.813080] name failslab, interval 1, probability 0, space 0, times 0 [ 3115.813100] CPU: 0 PID: 14243 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3115.813109] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 14:48:50 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x130) 14:48:50 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 4) [ 3115.813115] Call Trace: [ 3115.813137] dump_stack+0x107/0x167 [ 3115.813161] should_fail.cold+0x5/0xa [ 3115.813193] ? create_object.isra.0+0x3a/0xa20 [ 3115.813214] should_failslab+0x5/0x20 [ 3115.813231] kmem_cache_alloc+0x5b/0x360 [ 3115.813247] ? ksys_write+0x21a/0x260 [ 3115.813274] create_object.isra.0+0x3a/0xa20 [ 3115.813292] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3115.813316] kmem_cache_alloc+0x159/0x360 [ 3115.813341] getname_flags.part.0+0x50/0x4f0 [ 3115.813360] ? wait_for_completion_io+0x270/0x270 [ 3115.813379] getname_flags+0x9a/0xe0 [ 3115.813398] do_mkdirat+0x8d/0x2a0 [ 3115.813417] ? user_path_create+0xf0/0xf0 [ 3115.813441] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3115.813458] ? syscall_enter_from_user_mode+0x1d/0x50 14:48:50 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9"], 0x130) [ 3115.813483] do_syscall_64+0x33/0x40 [ 3115.813503] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3115.813515] RIP: 0033:0x7f4c4e303b19 [ 3115.813533] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3115.813543] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3115.813563] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3115.813573] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 14:48:50 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000700)=0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fd/3\x00') io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) r2 = signalfd4(r1, &(0x7f00000000c0)={[0x3]}, 0x8, 0x80000) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000100)) [ 3115.813584] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3115.813594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3115.813604] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 [ 3115.931118] ieee802154 phy0 wpan0: encryption failed: -22 [ 3116.046835] FAULT_INJECTION: forcing a failure. [ 3116.046835] name failslab, interval 1, probability 0, space 0, times 0 [ 3116.046856] CPU: 0 PID: 14256 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3116.046867] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3116.046873] Call Trace: [ 3116.046895] dump_stack+0x107/0x167 [ 3116.046922] should_fail.cold+0x5/0xa [ 3116.046950] ? __d_alloc+0x2a/0x990 [ 3116.046972] should_failslab+0x5/0x20 [ 3116.046990] kmem_cache_alloc+0x5b/0x360 [ 3116.047017] __d_alloc+0x2a/0x990 [ 3116.047034] ? dput+0x1ae/0xc90 [ 3116.047058] d_alloc+0x46/0x1c0 [ 3116.047084] __lookup_hash+0xcc/0x190 [ 3116.047106] filename_create+0x186/0x4a0 [ 3116.047127] ? filename_parentat+0x570/0x570 [ 3116.047150] ? getname_flags.part.0+0x1dd/0x4f0 [ 3116.047181] do_mkdirat+0xa0/0x2a0 [ 3116.047202] ? user_path_create+0xf0/0xf0 [ 3116.047228] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3116.047246] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3116.047272] do_syscall_64+0x33/0x40 [ 3116.047293] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3116.047306] RIP: 0033:0x7f4c4e303b19 [ 3116.047324] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3116.047334] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3116.047354] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3116.047365] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3116.047376] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3116.047386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3116.047397] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 14:48:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x4) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x120500, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000180)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r2, &(0x7f00000000c0)=0x80, &(0x7f0000000100)=@caif=@util, 0x0, 0x80800, 0x1}, 0x6) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) fadvise64(r3, 0x0, 0x0, 0x4) 14:48:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:48:51 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r3, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept(r3, 0x0, &(0x7f0000000100)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r4, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept(r4, 0x0, &(0x7f0000000100)) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r5, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r5, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) write$binfmt_elf64(r3, &(0x7f0000000140)=ANY=[@ANYRES64=r3, @ANYRESDEC=r2, @ANYRES16, @ANYRESOCT=r4, @ANYRES64], 0x78) splice(r2, 0x0, r1, 0x0, 0x7b, 0x0) 14:49:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 5) 14:49:06 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/cpu', 0x408000, 0x10) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x90, 0x6a, 0x0, 0x2, 0x0, 0x7f, 0x10010, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x400, 0x1}, 0x0, 0x0, 0x9ec3, 0x0, 0x48, 0x7e5, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0xf, r0, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x4) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r1, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index}, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000002a4300000000000000000000400000000000000000000000000000000000000000003800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecff0000"], 0x78) 14:49:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) sendfile(0xffffffffffffffff, r0, &(0x7f0000000040)=0x6, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0xfffffffffffffffe, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:49:06 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "3777bec46cadbec271ef1a0c69089f0d25ae7e7eef5c3a9c2b7a75238240879af13fa9a798e9414746c82eeed7c3f61051ead3fd4f7852fc8398ced850c9faa4a7a4362f97e73a13b24a40d6b0c43dd359291244538f69e9f69f8d4235d6f87e205032e1fd6a33d9c2ad298732eac946a3c526c60bfccffde72b341101c6b716b285b64d9d48359c351b9c960d5e98a3e7705b2f1709a04425eea4914a3e19b8c51bfa05ee967a769b2e8f29313bdc98539e92d6bbddedb92a7367b3c4a90000e595f3469efc0873f277db1bfce53714129dbbb15961bf618a48771abbef15e4e54aa8fe83deda7b230c9613af597bd8d2cf95c827862926aa3c1fb38092"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9"], 0x130) 14:49:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:49:06 executing program 6: sysfs$3(0x3) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0x78) splice(r3, 0x0, r1, 0x0, 0x7b, 0x0) 14:49:06 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf880) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r2 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r2, 0x5609, 0x0) r3 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000180)={0x0, 0x4, 0x4}) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r4 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r3, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:49:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:49:07 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x2040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x31e, 0x0) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000040)) r3 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r3, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) [ 3132.171640] FAULT_INJECTION: forcing a failure. [ 3132.171640] name failslab, interval 1, probability 0, space 0, times 0 [ 3132.171661] CPU: 1 PID: 14292 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3132.171672] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3132.171678] Call Trace: [ 3132.171701] dump_stack+0x107/0x167 [ 3132.171727] should_fail.cold+0x5/0xa [ 3132.171749] ? create_object.isra.0+0x3a/0xa20 [ 3132.171771] should_failslab+0x5/0x20 [ 3132.171789] kmem_cache_alloc+0x5b/0x360 [ 3132.171816] create_object.isra.0+0x3a/0xa20 [ 3132.171835] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3132.171861] kmem_cache_alloc+0x159/0x360 [ 3132.171879] ? __d_lookup+0x3bf/0x760 [ 3132.171905] __d_alloc+0x2a/0x990 [ 3132.171933] d_alloc+0x46/0x1c0 [ 3132.171958] __lookup_hash+0xcc/0x190 [ 3132.171981] filename_create+0x186/0x4a0 [ 3132.172000] ? filename_parentat+0x570/0x570 [ 3132.172020] ? getname_flags.part.0+0x1dd/0x4f0 [ 3132.172052] do_mkdirat+0xa0/0x2a0 [ 3132.172077] ? user_path_create+0xf0/0xf0 [ 3132.172102] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3132.172131] do_syscall_64+0x33/0x40 [ 3132.172152] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3132.172165] RIP: 0033:0x7f4c4e303b19 [ 3132.172184] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3132.172194] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3132.172215] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3132.172226] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3132.172237] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3132.172247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 14:49:07 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9"], 0x130) [ 3132.172258] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 14:49:07 executing program 7: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000001080)='ns/uts\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) 14:49:23 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0x78) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r4, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept(r4, 0x0, &(0x7f0000000100)) write(r4, &(0x7f0000000100)="253c696ac89b9ff27283c8766648cb5e3ba19528d2483cf393f4e4fd3a373db83cee2e4a76bc3b778ca0ea3f78f963140d40417d9d3553e846ab395ffa18ef3812bce2fcd1f3837a27a65e2f2806655cbe790b0eca3d6419903971c9dffabfc68fbd5362848c68b1389616073f29aaaf8550230ff1b4e5a36a8c2471c3e5", 0x7e) splice(r3, 0x0, r1, 0x0, 0x7b, 0x0) 14:49:23 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f"], 0x130) 14:49:23 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800, 0x0, @perf_bp={&(0x7f0000000340), 0xc}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_io_uring_submit(0x0, 0x0, 0x0, 0x1) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0x138, 0x16, 0x1, 0x0, 0x0, {{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x20000000, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'hmac(sha256)\x00'}}}]}, 0x138}}, 0x0) r2 = accept(r1, &(0x7f0000000140)=@ax25={{0x3, @rose}, [@netrom, @netrom, @remote, @remote, @rose, @bcast, @bcast, @rose]}, &(0x7f0000000200)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000001840)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$AUDIT_DEL_RULE(r4, &(0x7f0000001b80)={&(0x7f0000001b00)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001b40)={&(0x7f0000001e00)={0x43c, 0x3f4, 0x400, 0x70bd29, 0x25dfdbff, {0x3, 0x2, 0x3b, [0x1, 0xfffffff8, 0x7, 0x1, 0x3, 0x7, 0x6, 0xfff, 0x4, 0x7ff, 0x7, 0x200, 0x2d, 0x6, 0x9, 0x4, 0xd97, 0x6, 0x401, 0x8, 0x8bc5, 0x2, 0x80000001, 0x4, 0x7, 0x100, 0x9, 0x800, 0x9c, 0x3, 0x7, 0x8, 0x80000001, 0x8, 0x4, 0x4, 0x3, 0x4, 0x7fffffff, 0x0, 0x9, 0x1000, 0xffffffff, 0x1000, 0x3, 0xfff, 0x1, 0x7, 0x9, 0x10001, 0x9ed, 0x10001, 0x1, 0x2, 0x80, 0x101, 0x5, 0x7, 0x7f, 0x3, 0x10000, 0x81, 0x356b0f25, 0x6], [0x8, 0x8000, 0xffffffc5, 0x2455, 0x20, 0x200, 0x4, 0x3, 0x8001, 0xfffffff7, 0x7, 0xfff, 0x3, 0x6, 0x1, 0x1000, 0x0, 0x9, 0x661e, 0x7, 0x1, 0x40, 0x2, 0x7, 0x6, 0x81, 0x1ff, 0xb3a, 0xa9, 0x3, 0x9, 0xfffffc01, 0x1, 0x2, 0x8001, 0xfff, 0x7, 0x4, 0x40, 0xf540, 0xffffffff, 0x8, 0x4, 0x7f, 0x74, 0x1, 0x6, 0x20, 0x7fff, 0x9, 0x6, 0x83ba, 0x9, 0x4, 0xffff, 0x8000, 0x6, 0xfffffffc, 0x38, 0xa15d, 0x4, 0x0, 0x9, 0x5], [0x8, 0x4, 0x1, 0x1f, 0x10001, 0xcea, 0x3, 0x1, 0x0, 0x923, 0x0, 0x1, 0x74, 0x7, 0x5, 0x7, 0x5c, 0x2, 0x401, 0x1, 0x80, 0x8, 0x5, 0x200, 0x1, 0x7fff, 0x5, 0x6, 0x3, 0x8000, 0xc7a7, 0x101, 0x68, 0xfffff88a, 0x2, 0x8, 0x800, 0x0, 0xe131, 0x3f, 0x4668, 0x2, 0x0, 0x2, 0xceb, 0x3, 0x4, 0x3, 0x5, 0x7fffffff, 0x7fffffff, 0x7, 0x6, 0x1f, 0x1800, 0xfffffffd, 0x5e00f19f, 0x1, 0x2, 0x10001, 0x2, 0x3, 0x101, 0x401], [0x3, 0x4, 0x3d, 0x20, 0x101, 0x9, 0x9, 0x0, 0x10001, 0x101, 0xea4d, 0x1, 0x3ff, 0xe40e, 0x6, 0xfffffff9, 0x7, 0x7, 0x7f, 0xb3, 0xc9a, 0x100, 0x7fffffff, 0x6, 0xda, 0x3, 0x9, 0x697, 0x62, 0x8, 0x5, 0x20, 0x6, 0x5, 0x3c45, 0x8, 0x6, 0xffffffff, 0x15f, 0x3, 0x6, 0x20, 0x7a9, 0xaed, 0x1000, 0xa088, 0xffff27ae, 0x1000, 0x6, 0x5, 0x80000001, 0x2, 0x1f, 0x2, 0x40, 0x9, 0xa4, 0x9409, 0x0, 0x6, 0x8001, 0xfffffeff, 0x40, 0x64], 0x1b, ['hmac(sha256)\x00', '\x00', 'hmac(sha256)\x00']}, [""]}, 0x43c}}, 0x40010) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r3, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = accept(r3, 0x0, &(0x7f0000000100)) recvmmsg(r5, &(0x7f00000019c0)=[{{&(0x7f0000000140)=@isdn, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, &(0x7f0000000280)=""/144, 0x90}, 0x6}, {{&(0x7f0000000340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)=""/179, 0xb3}, {&(0x7f0000000480)=""/66, 0x42}, {&(0x7f0000000500)=""/152, 0x98}, {&(0x7f00000005c0)=""/101, 0x65}, {&(0x7f0000000640)=""/4096, 0x1000}], 0x5, &(0x7f00000016c0)=""/203, 0xcb}, 0x8001}, {{&(0x7f00000017c0)=@can, 0x80, &(0x7f0000001840)}, 0x4}, {{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001880)=""/108, 0x6c}, {&(0x7f0000001900)=""/29, 0x1d}], 0x2, &(0x7f0000001980)=""/10, 0xa}, 0x10001}], 0x4, 0x20, &(0x7f0000001ac0)={0x0, 0x3938700}) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r2) sendmsg$BATADV_CMD_GET_VLAN(r5, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r6, 0x2, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xffffffff}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20048840}, 0x44802) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4010}, 0x40) 14:49:23 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(0xffffffffffffffff, 0x541c, &(0x7f0000000200)) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r2, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r3 = creat(0x0, 0x1) r4 = perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) r5 = socket$inet_icmp(0x2, 0x2, 0x1) accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) pwrite64(0xffffffffffffffff, &(0x7f0000000240)="146afe78801c69deb4c3ab52946fa54764a3cf91aae22c3e87319c7c5a8853550b199970ecb29eb33537a2927e1f81f5c270", 0x32, 0xfffffffffffff8f1) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f00000001c0)={0x7, 0x0, &(0x7f0000000040)=[r2, r1, r1, r4, r5, r0, r2, r4]}, 0x8) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r7 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f0000000300)={[{@nomblk_io_submit}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) fsync(r6) ioctl$EXT4_IOC_GROUP_ADD(r7, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r3, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:49:23 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 6) 14:49:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x31e, 0x0) recvmmsg$unix(r0, &(0x7f0000003240)=[{{&(0x7f0000000540)=@abs, 0x6e, &(0x7f0000002940)=[{&(0x7f00000005c0)=""/71, 0x47}, {&(0x7f0000000640)=""/114, 0x72}, {&(0x7f00000006c0)=""/234, 0xea}, {&(0x7f00000007c0)=""/13, 0xd}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/132, 0x84}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f00000028c0)=""/74, 0x4a}], 0x8, &(0x7f00000029c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f0000002a00), 0x6e, &(0x7f0000002e80)=[{&(0x7f0000002a80)=""/119, 0x77}, {&(0x7f0000002b00)=""/150, 0x96}, {&(0x7f0000002bc0)=""/239, 0xef}, {&(0x7f0000002cc0)}, {&(0x7f0000002d00)=""/77, 0x4d}, {&(0x7f0000002d80)=""/196, 0xc4}], 0x6, &(0x7f0000002f00)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x40}}, {{&(0x7f0000002f40)=@abs, 0x6e, &(0x7f00000030c0)=[{&(0x7f0000002fc0)=""/27, 0x1b}, {&(0x7f0000003000)=""/182, 0xb6}], 0x2}}, {{&(0x7f0000003100)=@abs, 0x6e, &(0x7f00000031c0)=[{&(0x7f0000003180)=""/43, 0x2b}], 0x1, &(0x7f0000003200)=[@cred={{0x1c}}], 0x20}}], 0x4, 0x40002113, &(0x7f0000003340)={0x77359400}) perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x80000000}, r1, 0xffffffffffffffff, r0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f00000000c0)={0xa, &(0x7f0000000080)=[{0x7, 0x3}, {0x595, 0x6}, {0x7, 0x7f}, {0x5, 0x80}, {0x3, 0xd6}, {0x100, 0x9}, {0x7, 0x7}, {0x8000, 0x1}, {0x0, 0x6}, {0x400}]}) r3 = dup2(r2, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f0000000400)={0x1004000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)=0x0, {0x38}, &(0x7f0000000280)=""/9, 0x9, &(0x7f00000002c0)=""/251, &(0x7f00000003c0)=[0xffffffffffffffff, 0x0, 0x0, 0x0], 0x4, {r3}}, 0x58) pipe2(&(0x7f0000000480)={0xffffffffffffffff}, 0x80000) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x8, 0x6, 0x1, 0x1, 0x0, 0x100000000, 0x20000, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x800, 0x8, 0xfffffffa, 0x8, 0xeb6c, 0x4, 0x8, 0x0, 0x7, 0x0, 0x6}, r4, 0x0, r5, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x74b, 0x4, 0x1c, 0xc3, 0xf, "2b0e0c88f926954b"}) ftruncate(0xffffffffffffffff, 0x1000003) acct(&(0x7f0000000040)='./file0\x00') unshare(0x48020200) 14:49:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:49:23 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r2 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x8, 0x20, 0x0, 0x0, 0x0, 0x80, 0x0, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x8, 0x6}, 0x1b111, 0x2, 0x2, 0x1, 0xfffffffffffffc01, 0x3ff, 0x80, 0x0, 0x710, 0x0, 0x4}, 0x0, 0x3, r0, 0x3) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r2, 0x5609, 0x0) r3 = creat(0x0, 0x1) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r4 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r3, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) [ 3148.605768] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3148.648937] FAULT_INJECTION: forcing a failure. [ 3148.648937] name failslab, interval 1, probability 0, space 0, times 0 14:49:23 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f"], 0x130) [ 3148.648962] CPU: 1 PID: 14324 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3148.648973] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3148.648981] Call Trace: [ 3148.649007] dump_stack+0x107/0x167 [ 3148.649037] should_fail.cold+0x5/0xa [ 3148.649064] ? cgroup_mkdir+0x254/0xfe0 14:49:23 executing program 6: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r1, 0x4018f50b, &(0x7f0000000200)={0x1, 0x0, 0x80000000}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0x78) recvfrom(r3, &(0x7f0000000100)=""/43, 0x2b, 0x20347b932c52fc4c, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x2, 0x2, 0x1, 0x2, {0xa, 0x4e21, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20}}}, 0x80) splice(r3, 0x0, r1, 0x0, 0x7b, 0x0) [ 3148.649105] should_failslab+0x5/0x20 [ 3148.649131] __kmalloc+0x72/0x330 [ 3148.649166] cgroup_mkdir+0x254/0xfe0 14:49:23 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 7) [ 3148.649199] ? cgroup_destroy_locked+0x710/0x710 [ 3148.649231] kernfs_iop_mkdir+0x14d/0x1e0 [ 3148.649262] vfs_mkdir+0x424/0x680 [ 3148.649294] do_mkdirat+0x145/0x2a0 [ 3148.649318] ? user_path_create+0xf0/0xf0 [ 3148.649348] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3148.649370] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3148.649400] do_syscall_64+0x33/0x40 [ 3148.649425] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3148.649439] RIP: 0033:0x7f4c4e303b19 [ 3148.649461] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3148.649472] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3148.649496] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3148.649509] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3148.649521] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3148.649534] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3148.649546] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 [ 3148.752957] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3148.867848] FAULT_INJECTION: forcing a failure. [ 3148.867848] name failslab, interval 1, probability 0, space 0, times 0 14:49:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000040), 0x880, 0x0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$CDROMEJECT(r1, 0x5309) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0800038004"], 0x24}}, 0x0) [ 3148.867872] CPU: 1 PID: 14358 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3148.867884] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3148.867891] Call Trace: [ 3148.867915] dump_stack+0x107/0x167 [ 3148.867944] should_fail.cold+0x5/0xa [ 3148.867968] ? create_object.isra.0+0x3a/0xa20 [ 3148.867992] should_failslab+0x5/0x20 [ 3148.868018] kmem_cache_alloc+0x5b/0x360 [ 3148.868047] create_object.isra.0+0x3a/0xa20 14:49:23 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f"], 0x130) [ 3148.868068] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3148.868095] __kmalloc+0x16e/0x330 [ 3148.868128] cgroup_mkdir+0x254/0xfe0 [ 3148.868156] ? cgroup_destroy_locked+0x710/0x710 [ 3148.868183] kernfs_iop_mkdir+0x14d/0x1e0 [ 3148.868211] vfs_mkdir+0x424/0x680 [ 3148.868236] do_mkdirat+0x145/0x2a0 [ 3148.868258] ? user_path_create+0xf0/0xf0 [ 3148.868291] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3148.868312] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3148.868341] do_syscall_64+0x33/0x40 [ 3148.868366] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3148.868379] RIP: 0033:0x7f4c4e303b19 [ 3148.868399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3148.868410] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3148.868433] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3148.868444] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3148.868456] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3148.868467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3148.868479] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 [ 3148.965519] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=16410 sclass=netlink_route_socket pid=14361 comm=syz-executor.3 14:49:23 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 8) 14:49:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x3, 0x0, 0xb, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)=ANY=[@ANYBLOB="6e6f7265636f766572792c626172726905723d3078303030303030303030303030303030302c6e6f6a6f75726e616c5f636865636b73756d2c7379737667726f7570732c646973636172642c6461782c646f6e745f61707072616973652c7065726d69745f646972656374696f2c00"]) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:49:24 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) [ 3149.175220] FAULT_INJECTION: forcing a failure. [ 3149.175220] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3149.175248] CPU: 1 PID: 14366 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3149.175259] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3149.175266] Call Trace: [ 3149.175290] dump_stack+0x107/0x167 [ 3149.175318] should_fail.cold+0x5/0xa [ 3149.175350] __alloc_pages_nodemask+0x182/0x690 [ 3149.175381] ? __alloc_pages_slowpath.constprop.0+0x2230/0x2230 14:49:24 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r2 = openat2(0xffffffffffffff9c, 0x0, &(0x7f0000000100)={0x2b0100, 0x18}, 0x18) pidfd_getfd(0xffffffffffffffff, r1, 0x0) r3 = fsmount(r2, 0x1, 0xf9) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000004200210e0000000000000000000000001ec1510446ad9e06b57f9c686fa912ba3b2328a522ec336899b707fdfa07e4b086424a077c8b1bf0464349f5bab057d519066ed1d98d6e5fd1c5fa0cf73e0c2d"], 0x14}}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000001740)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) close_range(r3, r4, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) unshare(0x48020200) [ 3149.175429] alloc_pages_current+0x187/0x280 [ 3149.175455] allocate_slab+0x26f/0x380 [ 3149.175482] ___slab_alloc+0x470/0x700 [ 3149.175508] ? cgroup_mkdir+0x254/0xfe0 [ 3149.175529] ? selinux_determine_inode_label+0x1ab/0x340 14:49:24 executing program 7: getpgrp(0x0) clone3(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_notify(0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {0x0, 0x0, 0x4000000000008800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\b']) r1 = syz_open_dev$vcsn(&(0x7f0000000080), 0x9, 0x208082) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) openat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x80002, 0x121) bind$inet6(r2, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept(r2, 0x0, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0x7f}}, './file0\x00'}) [ 3149.175562] ? cgroup_mkdir+0x254/0xfe0 [ 3149.175584] ? __kmalloc+0x312/0x330 [ 3149.175600] __kmalloc+0x312/0x330 [ 3149.175631] cgroup_mkdir+0x254/0xfe0 [ 3149.175659] ? cgroup_destroy_locked+0x710/0x710 [ 3149.175685] kernfs_iop_mkdir+0x14d/0x1e0 [ 3149.175712] vfs_mkdir+0x424/0x680 [ 3149.175737] do_mkdirat+0x145/0x2a0 [ 3149.175759] ? user_path_create+0xf0/0xf0 [ 3149.175786] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3149.175805] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3149.175833] do_syscall_64+0x33/0x40 14:49:24 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 9) [ 3149.175856] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3149.175869] RIP: 0033:0x7f4c4e303b19 [ 3149.175889] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3149.175900] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3149.175922] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3149.175933] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3149.175944] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3149.175955] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3149.175966] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 [ 3149.482221] FAULT_INJECTION: forcing a failure. [ 3149.482221] name failslab, interval 1, probability 0, space 0, times 0 [ 3149.482248] CPU: 0 PID: 14382 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3149.482259] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3149.482265] Call Trace: [ 3149.482287] dump_stack+0x107/0x167 [ 3149.482313] should_fail.cold+0x5/0xa [ 3149.482334] ? create_object.isra.0+0x3a/0xa20 [ 3149.482356] should_failslab+0x5/0x20 [ 3149.482373] kmem_cache_alloc+0x5b/0x360 [ 3149.482392] ? mark_held_locks+0x9e/0xe0 [ 3149.482416] create_object.isra.0+0x3a/0xa20 [ 3149.482443] kmemleak_alloc_percpu+0xa0/0x100 [ 3149.482468] pcpu_alloc+0x4e2/0x1360 [ 3149.482507] ? cset_cgroup_from_root+0x2a0/0x2a0 [ 3149.482530] percpu_ref_init+0x31/0x3d0 [ 3149.482557] cgroup_mkdir+0x28b/0xfe0 [ 3149.482583] ? cgroup_destroy_locked+0x710/0x710 [ 3149.482607] kernfs_iop_mkdir+0x14d/0x1e0 [ 3149.482633] vfs_mkdir+0x424/0x680 [ 3149.482655] do_mkdirat+0x145/0x2a0 [ 3149.482676] ? user_path_create+0xf0/0xf0 [ 3149.482701] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3149.482718] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3149.482744] do_syscall_64+0x33/0x40 [ 3149.482765] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3149.482778] RIP: 0033:0x7f4c4e303b19 [ 3149.482796] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3149.482806] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3149.482827] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3149.482838] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3149.482848] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3149.482858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3149.482869] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 14:49:38 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat2(r0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)={0x290081, 0x142, 0x2}, 0x18) openat(r3, &(0x7f0000000100)='./file1\x00', 0x4000, 0x2) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x80, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_9p2000}, {@access_any}]}}) 14:49:38 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2"], 0x130) 14:49:38 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r4, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = accept(r4, 0x0, &(0x7f0000000100)) recvmmsg(r5, &(0x7f00000019c0)=[{{&(0x7f0000000140)=@isdn, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, &(0x7f0000000280)=""/144, 0x90}, 0x6}, {{&(0x7f0000000340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)=""/179, 0xb3}, {&(0x7f0000000480)=""/66, 0x42}, {&(0x7f0000000500)=""/152, 0x98}, {&(0x7f00000005c0)=""/101, 0x65}, {&(0x7f0000000640)=""/4096, 0x1000}], 0x5, &(0x7f00000016c0)=""/203, 0xcb}, 0x8001}, {{&(0x7f00000017c0)=@can, 0x80, &(0x7f0000001840)}, 0x4}, {{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001880)=""/108, 0x6c}, {&(0x7f0000001900)=""/29, 0x1d}], 0x2, &(0x7f0000001980)=""/10, 0xa}, 0x10001}], 0x4, 0x20, &(0x7f0000001ac0)={0x0, 0x3938700}) getsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0x78) splice(r3, 0x0, r1, 0x0, 0x7b, 0x0) 14:49:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:49:38 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x31e, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x3, 0x9, 0xfe}) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r2, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r3 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r3, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:49:38 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 10) 14:49:38 executing program 7: syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6c, 0x0, @dev, @rand_addr=0x64010102}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 14:49:38 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r1) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f00000000c0)={0x3, 0x2bf}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r3 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r3, 0x5609, 0x0) r4 = creat(0x0, 0x1) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) fallocate(r0, 0x6c, 0x2, 0xfffffffffffffffc) r5 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, &(0x7f0000000240)={0x6, 0x3}) ioctl$BTRFS_IOC_LOGICAL_INO(r4, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) [ 3163.439142] FAULT_INJECTION: forcing a failure. [ 3163.439142] name failslab, interval 1, probability 0, space 0, times 0 14:49:38 executing program 7: ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, &(0x7f0000000000)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r1, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc}]}, 0x20}}, 0x41) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x400c1}, 0x48080) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x50, 0x0, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_SEC_DEVICE={0x14, 0x23, 0x0, 0x1, [@NL802154_DEV_ATTR_SHORT_ADDR={0x6, 0x3, 0xaaa2}, @NL802154_DEV_ATTR_PAN_ID={0x6, 0x2, 0x2}]}, @NL802154_ATTR_SEC_DEVICE={0x4}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x90}, 0x4004) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1202}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x2c008) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000004c0), r0) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x7c, r1, 0x800, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x10d}, @NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x100000000}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x5}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4051}, 0x40) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x24, 0x0, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x80) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r3, &(0x7f0000000840)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x58, r2, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy2\x00'}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x40}, 0x800) r4 = fsmount(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r4, &(0x7f0000000940)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x3c, 0x0, 0x0, 0x70bd2c, 0x25dfdbfe, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x60040}, 0x51) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x38, r2, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@IEEE802154_ATTR_CHANNEL={0x5, 0x7, 0x19}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa3}, @IEEE802154_ATTR_COORD_HW_ADDR={0xc, 0x9, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0xf}]}, 0x38}, 0x1, 0x0, 0x0, 0x8801}, 0x4000000) sendmsg$NL80211_CMD_START_SCHED_SCAN(r4, &(0x7f0000000d00)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000ac0)={0x1d4, 0x0, 0x800, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x0, 0xd}}}}, [@NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0x4}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0x1}, @NL80211_ATTR_IE={0xd7, 0x2a, [@chsw_timing={0x68, 0x4, {0x9}}, @link_id={0x65, 0x12, {@initial, @device_b}}, @prep={0x83, 0x25, @ext={{}, 0x7, 0x1, @device_b, 0x80, @broadcast, 0x2, 0x6, @device_a, 0x780}}, @measure_req={0x26, 0x5b, {0xfa, 0x3f, 0x66, "075447ac08583a5e380b23924c5709b62b96b0fb8dc0069e458d4845f53d58799040f90f53d9681c6b9bde9655c4c256513fb66a23a5373c4e9047ce98c629a87453721a11e90cd49c80018786e8a67332337a0ddfba179a"}}, @dsss={0x3, 0x1, 0x78}, @chsw_timing={0x68, 0x4, {0x1ea8, 0x9}}, @cf={0x4, 0x6, {0x1, 0x13, 0x40, 0x1}}, @gcr_ga={0xbd, 0x6, @device_b}, @ht={0x2d, 0x1a, {0xc, 0x2, 0x4, 0x0, {0x1, 0x2, 0x0, 0x40, 0x0, 0x0, 0x1, 0x3}, 0x8, 0x39c, 0x80}}]}, @NL80211_ATTR_SCHED_SCAN_MATCH={0xc, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0xfffffb04}]}, @NL80211_ATTR_SCAN_FLAGS={0x8, 0x9e, 0x131}, @NL80211_ATTR_SCAN_SSIDS={0x78, 0x2d, 0x0, 0x1, [{0x11, 0x0, @random="584ba472bbf5a261a29ba166db"}, {0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ibss_ssid}, {0x12, 0x0, @random="957a2c85aec1e2da62e04ab004b3"}, {0x1d, 0x0, @random="9a04183d99bd04ad7f8a21ec39811a04c7e388cf8beabb2b2a"}, {0x5, 0x0, @random="eb"}]}, @NL80211_ATTR_SCAN_FREQUENCIES={0x2c, 0x2c, 0x0, 0x1, [{0x8, 0x0, 0x3}, {0x8, 0x0, 0x52a19679}, {0x8, 0x0, 0x7}, {0x8, 0x0, 0x5}, {0x8, 0x0, 0x7}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x8044}, 0x40) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000d80), r3) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000dc0)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_NEW_INTERFACE(r0, &(0x7f0000000e80)={&(0x7f0000000d40), 0xc, &(0x7f0000000e40)={&(0x7f0000000e00)={0x34, r5, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_EXTENDED_ADDR={0xc, 0x17, {0xaaaaaaaaaaaa0002}}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x20004000) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x2c, 0x0, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@NL802154_ATTR_NETNS_FD={0x8, 0x1d, r4}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_PID={0x8}]}, 0x2c}}, 0x8841) 14:49:38 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 11) [ 3163.439155] CPU: 0 PID: 14409 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3163.439161] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3163.439165] Call Trace: [ 3163.439180] dump_stack+0x107/0x167 [ 3163.439195] should_fail.cold+0x5/0xa [ 3163.439208] ? percpu_ref_init+0xd8/0x3d0 [ 3163.439222] should_failslab+0x5/0x20 [ 3163.439237] kmem_cache_alloc_trace+0x55/0x2c0 [ 3163.439252] ? cset_cgroup_from_root+0x2a0/0x2a0 [ 3163.439262] percpu_ref_init+0xd8/0x3d0 [ 3163.439277] cgroup_mkdir+0x28b/0xfe0 [ 3163.439292] ? cgroup_destroy_locked+0x710/0x710 [ 3163.439306] kernfs_iop_mkdir+0x14d/0x1e0 [ 3163.439321] vfs_mkdir+0x424/0x680 [ 3163.439334] do_mkdirat+0x145/0x2a0 [ 3163.439346] ? user_path_create+0xf0/0xf0 [ 3163.439361] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3163.439372] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3163.439388] do_syscall_64+0x33/0x40 [ 3163.439400] entry_SYSCALL_64_after_hwframe+0x61/0xc6 14:49:38 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2"], 0x130) [ 3163.439407] RIP: 0033:0x7f4c4e303b19 [ 3163.439418] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 14:49:38 executing program 3: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat2(r0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)={0x290081, 0x142, 0x2}, 0x18) openat(r3, &(0x7f0000000100)='./file1\x00', 0x4000, 0x2) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x80, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_9p2000}, {@access_any}]}}) [ 3163.439424] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3163.439435] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3163.439441] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3163.439447] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3163.439453] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3163.439459] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 [ 3163.583841] FAULT_INJECTION: forcing a failure. [ 3163.583841] name failslab, interval 1, probability 0, space 0, times 0 [ 3163.583863] CPU: 1 PID: 14426 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3163.583874] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3163.583880] Call Trace: [ 3163.583904] dump_stack+0x107/0x167 [ 3163.583930] should_fail.cold+0x5/0xa [ 3163.583953] ? create_object.isra.0+0x3a/0xa20 [ 3163.583975] should_failslab+0x5/0x20 [ 3163.583994] kmem_cache_alloc+0x5b/0x360 [ 3163.584021] create_object.isra.0+0x3a/0xa20 [ 3163.584040] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3163.584067] kmem_cache_alloc_trace+0x151/0x2c0 [ 3163.584099] ? cset_cgroup_from_root+0x2a0/0x2a0 [ 3163.584118] percpu_ref_init+0xd8/0x3d0 [ 3163.584146] cgroup_mkdir+0x28b/0xfe0 [ 3163.584172] ? cgroup_destroy_locked+0x710/0x710 [ 3163.584198] kernfs_iop_mkdir+0x14d/0x1e0 [ 3163.584224] vfs_mkdir+0x424/0x680 [ 3163.584248] do_mkdirat+0x145/0x2a0 [ 3163.584270] ? user_path_create+0xf0/0xf0 [ 3163.584296] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3163.584315] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3163.584343] do_syscall_64+0x33/0x40 [ 3163.584365] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3163.584378] RIP: 0033:0x7f4c4e303b19 [ 3163.584397] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3163.584408] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3163.584429] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3163.584440] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3163.584452] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3163.584462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3163.584473] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 14:49:53 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept(r1, 0x0, &(0x7f0000000100)) ppoll(&(0x7f0000000040)=[{r1}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0x78) splice(r3, 0x0, r0, 0x0, 0x7b, 0x0) 14:49:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a2649cc55aa09997b19022ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89275c29c7decb81fb950000000040ddb827b44d010c05a5c98e52702b059eac222eecbad64abf414366a40197eedcfb2181ed287fad9c290de202b64349f90652599f5e5502d5904084eb98ef37f66802e57c187ad97551d2037eb89eb8e26cc6127a28b406a5e9949a381bdf78028030bf89fd805a0c9ac7798552125b8581902a347753c1a6272a382ee89fab33af8d2e27ae4ce599e6e84fcf15", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 12) 14:49:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:49:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffdfff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x31e, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r1) r3 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e6f7265636f766572792c626172726965723d3078303030303030303030303030303030302c6e6f6a6f75726e616c5f636865636b73756d2c7379737667726f7570732c6772706a71756f74613d2e2f66696c65312c646973636172642c6461782c646f6e745f61707072616973652c7065726d69745f646972656374696f2c002a7ba137163921bf0b755b9f98700378ce22d98e18fad9c4"]) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r3, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:49:53 executing program 7: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f000000e5c0)=[{{0x0, 0x0, &(0x7f0000006140)}}], 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x26}}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0xffe3) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0x4, &(0x7f00000001c0), &(0x7f00000013c0)=0x2) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_RCVMTU(r3, 0x112, 0x4, &(0x7f00000001c0), &(0x7f00000013c0)=0x2) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x5, 0x1, 0x3, 0x0, 0x0, {0xa, 0x0, 0x3}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40081}, 0x100040a0) sendmsg$NL80211_CMD_TESTMODE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000300)={0x4, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x20000000}, {}, {}, @ext={0x0, 0x0}}], 0x1c) 14:49:53 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2"], 0x130) 14:49:53 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1340, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8158, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x480, 0x0, 0x2}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = fork() r2 = fork() r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) kcmp(r1, r2, 0x5, r3, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, r2) r4 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r4, 0x5609, 0x0) r5 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)=ANY=[@ANYBLOB="6e6f65636f766572791a91cb42726965723d3078303030303030303030303030303030302c6e6f6a6f75726e616c5f6368655545ad60636b73756d0c7379737667726f7570732d646973636104000000000000006f6e745f61707072616973652c7065726d69745f646872656374"]) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000280)={0x20000001, 0x200, 0x0, 0x7c0, 0xfffffffd, 0x4}) ioctl$BTRFS_IOC_LOGICAL_INO(r5, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:49:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000100)=""/117, 0x75, 0x10001, &(0x7f0000000040)={0xa, 0x4e23, 0x6, @empty, 0xf41b}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) shutdown(r0, 0x1) 14:49:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x10) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:49:53 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) r2 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x6, 0x1, 0xe1, 0x5, 0x0, 0x7, 0x10013, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xb}, 0x50, 0xba, 0x3, 0x0, 0x0, 0x5, 0x5, 0x0, 0x1, 0x0, 0x9}, r1, 0xc, r2, 0xb) r3 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r4 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, 0x0, 0x0) [ 3178.273795] FAULT_INJECTION: forcing a failure. [ 3178.273795] name failslab, interval 1, probability 0, space 0, times 0 [ 3178.276829] CPU: 0 PID: 14444 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3178.278269] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 14:49:53 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r1, 0x40189429, &(0x7f00000011c0)={0x1, 0x9, 0x5}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0x78) splice(r3, 0x0, r1, 0x0, 0x7b, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r4, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r5, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r5, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r5, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept(r5, 0x0, &(0x7f0000000100)) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept(r4, 0x0, &(0x7f0000000100)) preadv2(r4, &(0x7f0000001180)=[{&(0x7f0000000080)=""/37, 0x25}, {&(0x7f0000000100)=""/128, 0x80}, {&(0x7f0000000180)=""/4096, 0x1000}], 0x3, 0x5, 0xffffffff, 0x1) [ 3178.279942] Call Trace: [ 3178.279965] dump_stack+0x107/0x167 [ 3178.279991] should_fail.cold+0x5/0xa [ 3178.280012] ? create_object.isra.0+0x3a/0xa20 [ 3178.280034] should_failslab+0x5/0x20 [ 3178.280052] kmem_cache_alloc+0x5b/0x360 [ 3178.280079] create_object.isra.0+0x3a/0xa20 [ 3178.280107] kmemleak_alloc_percpu+0xa0/0x100 [ 3178.280131] pcpu_alloc+0x4e2/0x1360 [ 3178.280178] cgroup_rstat_init+0x14f/0x1f0 [ 3178.280206] cgroup_mkdir+0x709/0xfe0 [ 3178.280233] ? cgroup_destroy_locked+0x710/0x710 14:49:53 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "3777bec46cadbec271ef1a0c69089f0d25ae7e7eef5c3a9c2b7a75238240879af13fa9a798e9414746c82eeed7c3f61051ead3fd4f7852fc8398ced850c9faa4a7a4362f97e73a13b24a40d6b0c43dd359291244538f69e9f69f8d4235d6f87e205032e1fd6a33d9c2ad298732eac946a3c526c60bfccffde72b341101c6b716b285b64d9d48359c351b9c960d5e98a3e7705b2f1709a04425eea4914a3e19b8c51bfa05ee967a769b2e8f29313bdc98539e92d6bbddedb92a7367b3c4a90000e595f3469efc0873f277db1bfce53714129dbbb15961bf618a48771abbef15e4e54aa8fe83deda7b230c9613af597bd8d2cf95c827862926aa3c1fb38092"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d13"], 0x130) [ 3178.280257] kernfs_iop_mkdir+0x14d/0x1e0 [ 3178.280283] vfs_mkdir+0x424/0x680 [ 3178.280306] do_mkdirat+0x145/0x2a0 [ 3178.280327] ? user_path_create+0xf0/0xf0 [ 3178.280352] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 14:49:53 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000180)={0x6, 0x7, 'syz2\x00'}, &(0x7f00000001c0)=0x28) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000fffffdfd0201000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000249932370a55acc70000000000000000000010000000003360dfff14ffbe0000000000000000000000000000000000000000001000000000000800000000000000000000000000040000000000000000000000000000ffffffff000000000000000000000000000000200000000000bebfe49b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005de5470abcd9c6ee80db00"/266]) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) unshare(0x48020200) [ 3178.280369] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3178.280396] do_syscall_64+0x33/0x40 [ 3178.280417] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3178.280430] RIP: 0033:0x7f4c4e303b19 [ 3178.280449] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3178.280459] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3178.280480] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3178.280490] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3178.280501] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3178.280511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3178.280522] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 14:49:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x31e, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000003080)='./file0\x00', &(0x7f00000030c0), 0x80000, &(0x7f0000003100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x5}}, {@posixacl}, {@cache_none}, {@posixacl}, {@msize={'msize', 0x3d, 0x3}}, {@version_9p2000}], [{@fscontext={'fscontext', 0x3d, 'root'}}]}}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$inet(r2, &(0x7f0000000180)=[{{&(0x7f0000005340)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000c00)=[{&(0x7f00000000c0)="863c", 0x2}], 0x1, &(0x7f00000002c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x32}, @private}}}], 0x20}}], 0x1, 0x810) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x8010, 0xffffffffffffffff, 0x10000000) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r4, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept(r4, 0x0, &(0x7f0000000100)) syz_io_uring_submit(0x0, r3, &(0x7f0000000040)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[r2, r4], 0x2, 0x0, 0x1}, 0x80000001) sendmmsg$inet6(r4, &(0x7f0000002ec0)=[{{&(0x7f0000000080)={0xa, 0x4e20, 0x56cc, @mcast1, 0x8000}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000c40)="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", 0x1000}], 0x1}}, {{&(0x7f0000001d40)={0xa, 0x4e22, 0xb74, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x3}, 0x1c, &(0x7f0000000740)=[{&(0x7f0000000300)="d9e99dfde37f15b36ca3b0044c2df163105477af05018f2738294c954dd41bd74ba420ee593fc652ba2f39dbc596ed15373ebe36b15461a7bfebab0e750f81187ed4e4c95537041d8158c30363928931c05ffeadec936ee5cc68263bf1bfb4bf974dd4a07d918dcbf197b395fa27de1bd4f165974079ceceaaa8991a55542eb0d910ea16263be9c0a02cc3b3aeb70fc223df3bc5290294aea94df0bc2dc3b78a93b1d392008f61a955203a003d1704001b303651052f14b0c29910dd9ba4f5b74a797b106bf3410819f7dff94010337edfa0724975d200"/228, 0xe4}, {&(0x7f0000000200)="724d49852ab0123757c9417f7883b7af95a1126023a712598cd48fa3f11972438ae7a60600ca8638d73e1cff3183565c31f3257dce0a8c529fc2ef62383990197dbd2715007b1b6cf1d8fcbabcf50579942f3e28a297", 0x56}, {&(0x7f0000000400)="554dfff324343f442018db6b845abeceb177411d20c7377b66371754b448dedb24be0323fb13e23c56c6b0cce5176e6cadbf0d6ed956f1ce59f577d4deaddde6bc71dd030581e978923a13fd84c13245203be8946f0ea5a5db7a535d7dbf57bf1b8e1c06c6678b2c0707c44c1a2d9970a6c7c8f063860db9ab12a010a5611c0ecf14", 0x82}, {&(0x7f00000004c0)="97c57f0d4c333bf00e6ac4d735308fb24593a787cff48e435bf41b229f8bb83a1dd4955d176907321d3567ca40796a54e6180f9fb59431f9099b476110843c80b1c54758f84c3702839a177a3377ecdcc1db72761f570b0dfb604dd5268c0f1f432ba569d7dabda0c4ea0f2578c4d407c50cc6eb523b0853b28c7a8713563e990c6378425dcdf92e8cc876ea6804384d77c8bd92c34385370a3f98b84f74259c357ba31e85872a4bd2ae4d11791db19d4aad9340a2f4a130f56ce519b2c09c95117f3e63a6ca93ac2951fdd516b1a356c0b0235358d10113", 0xd8}, {&(0x7f00000005c0)="7cd28f493b2efa50b35189d476fb933c8971c6202447c04e306b9a4e7eda8c971d925a37d62fee33f59dd154cf3caef0af4da51b3ac92e781507741256c5ffd05b18affe675ced2cc1dc24233e1c6cde3248da7479da4a98480bcf78c955fc712df4420d18fd3409cccc794bbb8dbb6fd961a0e6e5d5d10048950f50381db3d0687f638c9c9f5beb4f11c34dc35874db5d401acd18393b0a9faae70d3c7f655c589a4b73315e38590f707ceb1a8b0955bb078cd9f549a2058aa280740b88189d068e5a1eab9101af6498c30d0b70e17db4b780f77bf9676ec99c5392b69e72703c74b25741b6c76bbb55a26fbd9ce744", 0xf0}, {&(0x7f00000006c0)="b6a20ea5ae7c8b48618225aca64bd409d5d79604d03b2ec3565bd18ab167bdf0b01072a96088caa63d1d55d7b8fb8c94c23407831614e0377f65ed473a572b01348dc7fe47296d72af01ad236a618c51ab9d2341c1b32805f8d4880a1f0c43ac1e0d0c02c9a6143aa2e296dc886d4e", 0x6f}], 0x6}}, {{&(0x7f0000000280)={0xa, 0x4e20, 0x81, @mcast2, 0x6}, 0x1c, &(0x7f0000000a40)=[{&(0x7f00000007c0)="add89c8a8368d0787dab55de4c7cd0ff5ea2e28a06990e15d12f47e2bb44", 0x1e}, {&(0x7f0000000800)="b773967be9f854ebecce982208b11a2a72e7309cd1049f594a6ed70fa4a276f5b6d26b6640430d8bbb90fafdd7da82f8a6a092d17d7a37e0860377cfbca4d1086cbdb6a440c6a03ba69fd145a35af356a1ad98e90148ba1c4e7db2bdf65df62149166e57381208c20587e70b4a8477ed4b9b970f500c574d9f5397947eb3fa609a6a4200dbe28ce68b16c8e50ff4f210cba2e932183d320ce19ac3b809826774d1d361ed18c79645", 0xa8}, {&(0x7f00000008c0)="eef3001ed953aaf8801230a86c4d469519842a18b4d37887f29c8ce74d075db51a30e9b09d75d265f9336f73e89c5337bd395bd6c432fbe335932dbad6825aac7dedc1ad5a5bc84bd829840a42ab246be6c08f26c55d733da2b5977572bf5c09be", 0x61}, {&(0x7f0000000940)="241495a5df565d722f358517a3f1807b6f26e31424dfdf1d9c8d533aa488f05d03b025accc062629e35cbbd98f0d2712a0ab770911350a16d73b725389930967297d471bf7be0edfd976b03e7b2db19673bcfd053234747a1854a78c233ae178822a9ed275e3120851640b118a8cbf90ff06e9a125696eb7e84e4fb82f588cbf6a41181ffa81d25e864dfae06438a1ab90833bdf5de46f7fe9d44d55195a7840035b16b5355dce69a5ebbb83ed3655834386faf5cc8ae8073e701d82c3dcda86ea3f85e045e24c9d5af767e67fc16d0705742ecdf28ef6a37a6bb26818f5", 0xde}], 0x4, &(0x7f0000000a80)=[@dstopts_2292={{0xb8, 0x29, 0x4, {0x0, 0x13, '\x00', [@generic={0xa8, 0x9d, "c35a7ec62ad82ad4212e846dd794ebb963aed07d7f814fd4a4827488031ef9824a74009c02f42ef73a7737882424fbdb26de34c91c0b09857343546d6fa782a69d369f3ba8159d7fa3d4383b07555f0d86b482367da2204bdb461e1d2d97299ab11e9d14c304f013f9cca80ed3462d47db095bec9ad736d3cec4862cb731c5b1d72e55950512b9f09dc3e25e09e8640eb7369f98ba1f9fa14f3eecc61f"}]}}}], 0xb8}}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000000b40)="f8bc5fc1220d05251e3f84be2cf84c3d1b24e0a69e8ccd66860b4c765199891aca6eed4766916f2c", 0x28}, {&(0x7f0000001c40)="71ae42cfdf1d0a45d9e136a79107b20077d73b21548286bb286e322971bf4df574b37ed2a85e60e62fc00285152f6b719b5c2d93966c5a6ad6cd0dc88935b8761b0e76170576463d08d2416f7419865cbe046d3727576f1b0e3721ace02aa33307a91fc04766953664a2dfd6ca6f455e80d19f59da18feb038c45bf69d01eb5d682f01f9feeb13d299a8c14ff9a422c8e585d2e427c0d9323996bd9ba227dc0efe08bec6b343f4196262432f51bfb2c4c7a8b702ed6f1179b654705c17c0d1402223b4875301620c39e2d3fa7e", 0xcd}, {&(0x7f0000000b80)="1076af62ada9aaef29b6788ab03f50b27d3b53127343ef", 0x17}, {&(0x7f00000031c0)="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", 0x108f}, {&(0x7f0000000bc0)="809d66331c268e65ece2b349bef53ce0671b0c0a", 0x14}], 0x5, &(0x7f0000002dc0)=ANY=[@ANYBLOB="140000000000000029000000340000000200000000000000b80000000000000029000000390000000014010900000000fe80000000000000000000000000003100000000000000000000ffffac141414fe80000000000000000000000000002dfe8000000000000000000000000000aafe8000000000000000000000000000aafc000000000000000000000000000000fe8000000000000000000000aafe800000000000000000000000000042fc00000000000000000000000005000000000000000000000000000000000001"], 0xd0}}], 0x4, 0x404800c) r5 = syz_open_dev$vcsa(&(0x7f0000002fc0), 0x4, 0x12da03) ioctl$sock_ifreq(r5, 0x8990, &(0x7f0000003040)={'wlan0\x00', @ifru_data=&(0x7f0000003000)="e3616896ef0d0c5ac857473135fcc24e744a8295f8579f2c78f102161f73efc8"}) 14:49:53 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000002c0)=ANY=[@ANYBLOB="6e6f7265636f76617279062c62617272bb65083d307830b300006dee81a52260f16680601677516a0000000000303030f73030302c6e6f6a6f95726e616c5f636865636b73756d2c7379737667726f7570732c6469736361726488d861782c646f6e745f61707072c53fad72344aafb54aa758ddc02f1311616973652c7065726d69745f646972656374696f2c083eae94e899be56"]) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:49:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 13) 14:49:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x180) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f0000000440)=ANY=[@ANYRESOCT=r2]) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x5b3, 0x6, 0x1, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) [ 3178.505809] FAULT_INJECTION: forcing a failure. [ 3178.505809] name failslab, interval 1, probability 0, space 0, times 0 [ 3178.505840] CPU: 1 PID: 14491 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3178.505846] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3178.505849] Call Trace: [ 3178.505865] dump_stack+0x107/0x167 [ 3178.505881] should_fail.cold+0x5/0xa [ 3178.505895] ? create_object.isra.0+0x3a/0xa20 [ 3178.505908] should_failslab+0x5/0x20 [ 3178.505919] kmem_cache_alloc+0x5b/0x360 [ 3178.505930] ? mark_held_locks+0x9e/0xe0 [ 3178.505943] create_object.isra.0+0x3a/0xa20 [ 3178.505959] kmemleak_alloc_percpu+0xa0/0x100 [ 3178.505973] pcpu_alloc+0x4e2/0x1360 [ 3178.505999] cgroup_rstat_init+0x14f/0x1f0 [ 3178.506016] cgroup_mkdir+0x709/0xfe0 [ 3178.506030] ? cgroup_destroy_locked+0x710/0x710 [ 3178.506045] kernfs_iop_mkdir+0x14d/0x1e0 [ 3178.506060] vfs_mkdir+0x424/0x680 [ 3178.506075] do_mkdirat+0x145/0x2a0 [ 3178.506086] ? user_path_create+0xf0/0xf0 [ 3178.506100] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3178.506109] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3178.506125] do_syscall_64+0x33/0x40 [ 3178.506137] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3178.506144] RIP: 0033:0x7f4c4e303b19 [ 3178.506154] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3178.506160] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3178.506172] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3178.506178] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3178.506184] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3178.506190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3178.506196] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 14:50:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6b3b1058d2db1fa5443a2"], 0x28}}, 0x0) 14:50:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d13"], 0x130) 14:50:15 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_RM_DEV(r0, 0x5000940b, &(0x7f0000000100)={{r1}, "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"}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0x78) splice(r3, 0x0, r1, 0x0, 0x7b, 0x0) 14:50:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0xf0b, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') [ 3200.203413] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3200.214009] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 14:50:15 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)={0x28, 0x8017, 0xc21, 0x0, 0x0, {0x80}, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast2}}]}, 0x28}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000040)={&(0x7f0000000340)={0x125c, 0x24, 0x200, 0x70bd26, 0x25dfdbfb, {0x12}, [@typed={0x8, 0x78, 0x0, 0x0, @uid=0xee00}, @generic="d4b7162c0218093820424b047618a0ce2d707fce71ceb6b55bf62123165488c241afe1e717cc171c5eba71ba83fcd9912918b69f645834f475889b3b1169424736d9574f531dc175a9fa3bdb8207ebed5554bd05bc73a47356922f24b0c342abb769eead4969bc23cec0a26540421034d17f530b41f3f6d6148121fb3c955da86fee", @typed={0x8, 0x76, 0x0, 0x0, @ipv4=@private=0xa010102}, @nested={0x11b1, 0x65, 0x0, 0x1, [@generic="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", @typed={0x8, 0x5f, 0x0, 0x0, @u32=0xfffffbcb}, @typed={0x8, 0x7a, 0x0, 0x0, @u32=0x3ff}, @generic="7bd9ab546ef4154e25dc4a62e371d698712431f96267f6f78fb2ac23c545fd5792812fac28f8a082f7a523fac5060168cfc7ab8444c1d1a7f83126bd26fb5d0e1d4a264bca5acc74c117a84fa98bfd22e84ad2d732965fbcdba42bff3db5d2797b1d4d172159f31a66c48cfb853e3c4de11a2318a923c272a83340c74e687a4776529955c132994cf4399f39d2c6c61f97cfacaae3f7ecd8da87ebb16b4dac3cb14d6aa5b49f9590d5fdf7e12255658fd6b1cad7ef7e1fd54d2fc26a28d872a8269a06fe3388abc5991bb079eb996668d842a8", @generic="57626c883ea8feb80f83d80e6d88bc6356c6a8d8eda935c56e4cc80f365fc37b17efe6736b8f28918df6fd1e96314dff040a9899ded2838935bd2a9a480e4d2586cf1d5268f0d8ad095344631f350e33eeb8d7f75c12bd5d600604e464fcc955a0f948542ed3e6365715e992cb772bcd826e6ba44519ae4704067039431db43b5dc6e93cd416461f200214109c44a16cc5ab7ed74428fe", @generic="16d46e6dc7a20dc874dfa6a9cfcb616e1e071ae9f4c6f5061d4e0db93480f09f69dc37ffe87d37ada10a708c060def610288d6"]}]}, 0x125c}, 0x1, 0x0, 0x0, 0x24000000}, 0x20000000) 14:50:15 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x8c00, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r2 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r2, 0x5609, 0x0) r3 = creat(0x0, 0x1) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) r4 = perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r5 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)=ANY=[@ANYBLOB="6e6f7265636f766572792c626172726965723d3078303030303030303030303030303030302c6e6f6a6f75726e616c5f636865636b73756d2c73797376677201d470732c646973636172642c6461782c646f6e745f6f707072616973652c7065726d69745f646972656374696f2c00"]) kcmp(0x0, 0x0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x80, 0x0, 0x7f, 0x1, 0x0, 0x8, 0x82018, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x1000, 0x584f}, 0x804, 0xc2f, 0x37, 0x8, 0x7, 0x0, 0xa883, 0x0, 0x5, 0x0, 0xffffffff}, 0x0, 0xc, r4, 0x3) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r3, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) creat(&(0x7f0000000180)='./file0\x00', 0x50) 14:50:15 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xc}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000300)={0x4, 0x7255, 0x2000}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e6f7265636f7665511e162d6423fcff9f723d3078303030303030303030303030303030302c6d61785f62617463685f74696d653d3078303030303030303030303030303030332c7379737667726f7570732c7573726a71756f74613d2e2f66696c65312c646973636172642c6461782c646f6e745f61707072616973652c7065726d69745f646972656374696f2c00"]) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x8, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) [ 3200.260145] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32791 sclass=netlink_route_socket pid=14517 comm=syz-executor.7 [ 3200.273829] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32791 sclass=netlink_route_socket pid=14519 comm=syz-executor.7 14:50:15 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 14) 14:50:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6b3b1058d2db1fa5443a2"], 0x28}}, 0x0) 14:50:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d13"], 0x130) 14:50:15 executing program 7: io_uring_enter(0xffffffffffffffff, 0x1fd, 0x12bd, 0x3, &(0x7f00000000c0), 0x8) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1a080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1010c, 0x0, 0x0, 0x9, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x1000003) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x600a00, 0x0) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[], 0x98a) readv(r1, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000080)={0x0, 0xfdfdffff, 0x102, 0x0, '\x00', [{}, {0x800, 0x0, 0x400000000000000}], ['\x00']}) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x4040, 0x115) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) preadv2(r3, &(0x7f0000000480)=[{&(0x7f0000000300)=""/49, 0x31}, {&(0x7f0000000340)=""/80, 0x50}, {&(0x7f00000003c0)=""/169, 0xa9}, {&(0x7f00000001c0)=""/148, 0x94}, {&(0x7f0000000800)=""/26, 0x1a}, {&(0x7f0000000580)=""/149, 0x95}, {&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/235, 0xeb}, {&(0x7f0000000980)=""/185, 0x9}], 0x9, 0x8, 0x7f, 0x19) r4 = socket(0x2c, 0x6, 0x3) ioctl$FITHAW(r4, 0xc0045878) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r5, &(0x7f0000000080)={0x1a}) acct(&(0x7f0000000040)='./file0\x00') unshare(0x48020200) [ 3200.363143] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3200.395070] FAULT_INJECTION: forcing a failure. [ 3200.395070] name failslab, interval 1, probability 0, space 0, times 0 [ 3200.395091] CPU: 0 PID: 14526 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3200.395101] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3200.395107] Call Trace: [ 3200.395130] dump_stack+0x107/0x167 [ 3200.395156] should_fail.cold+0x5/0xa [ 3200.395184] should_failslab+0x5/0x20 [ 3200.395203] __kmalloc_track_caller+0x79/0x310 [ 3200.395221] ? kstrdup_const+0x53/0x80 [ 3200.395244] ? kmemleak_alloc_percpu+0xa0/0x100 14:50:15 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 15) [ 3200.395269] kstrdup+0x36/0x70 [ 3200.395293] kstrdup_const+0x53/0x80 [ 3200.395314] __kernfs_new_node+0x9d/0x850 [ 3200.395340] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3200.395369] ? rcu_read_lock_sched_held+0x3e/0x80 14:50:15 executing program 3: io_uring_enter(0xffffffffffffffff, 0x1fd, 0x12bd, 0x3, &(0x7f00000000c0), 0x8) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x83) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x1000003) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x600a00, 0x0) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[], 0x98a) readv(r1, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r3, 0x31e, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000440)=0x1) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000fffffdfd0201000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd3b0458be6e765c95c5187905ca"]) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00', @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf250b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990009000000320000000e000a00c8f0dc28d8662a1db7910000040028005c005080140008800400020004000200040002000400010004000600040005000800030001ac0f0011000100a425f3ef0edd15a2f4526a51fe0000000800030005ac0f000400050004000500050002000300000005000900010000000e000a0093331bc38c0299c9ac13000009000700a956b682b5000000040028000a000600ffffffffffff00000500080004000000"], 0xcc}, 0x1, 0x0, 0x0, 0x880}, 0x40) syz_open_dev$tty20(0xc, 0x4, 0x0) acct(&(0x7f0000000040)='./file0\x00') [ 3200.395386] ? pcpu_alloc+0x12a/0x1360 [ 3200.395414] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 3200.395445] kernfs_create_dir_ns+0x9c/0x230 [ 3200.395474] cgroup_mkdir+0x318/0xfe0 14:50:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e97"], 0x130) [ 3200.395501] ? cgroup_destroy_locked+0x710/0x710 [ 3200.395526] kernfs_iop_mkdir+0x14d/0x1e0 [ 3200.395554] vfs_mkdir+0x424/0x680 [ 3200.395577] do_mkdirat+0x145/0x2a0 [ 3200.395598] ? user_path_create+0xf0/0xf0 [ 3200.395623] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3200.395641] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3200.395667] do_syscall_64+0x33/0x40 [ 3200.395688] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3200.395701] RIP: 0033:0x7f4c4e303b19 [ 3200.395720] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3200.395730] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3200.395751] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3200.395762] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3200.395772] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3200.395783] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3200.395794] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 [ 3200.587223] FAULT_INJECTION: forcing a failure. [ 3200.587223] name failslab, interval 1, probability 0, space 0, times 0 [ 3200.587251] CPU: 0 PID: 14541 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3200.587262] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 14:50:15 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a2649cc55aa09997b19022ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89275c29c7decb81fb950000000040ddb827b44d010c05a5c98e52702b059eac222eecbad64abf414366a40197eedcfb2181ed287fad9c290de202b64349f90652599f5e5502d5904084eb98ef37f66802e57c187ad97551d2037eb89eb8e26cc6127a28b406a5e9949a381bdf78028030bf89fd805a0c9ac7798552125b8581902a347753c1a6272a382ee89fab33af8d2e27ae4ce599e6e84fcf15", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 16) [ 3200.587268] Call Trace: [ 3200.587290] dump_stack+0x107/0x167 [ 3200.587316] should_fail.cold+0x5/0xa [ 3200.587338] ? create_object.isra.0+0x3a/0xa20 [ 3200.587360] should_failslab+0x5/0x20 [ 3200.587379] kmem_cache_alloc+0x5b/0x360 [ 3200.587398] ? lock_acquire+0x197/0x4a0 [ 3200.587421] create_object.isra.0+0x3a/0xa20 [ 3200.587441] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3200.587467] __kmalloc_track_caller+0x177/0x310 [ 3200.587485] ? kstrdup_const+0x53/0x80 [ 3200.587512] kstrdup+0x36/0x70 [ 3200.587533] kstrdup_const+0x53/0x80 [ 3200.587553] __kernfs_new_node+0x9d/0x850 [ 3200.587580] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3200.587608] ? rcu_read_lock_sched_held+0x3e/0x80 [ 3200.587625] ? pcpu_alloc+0x12a/0x1360 [ 3200.587653] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 3200.587684] kernfs_create_dir_ns+0x9c/0x230 [ 3200.587717] cgroup_mkdir+0x318/0xfe0 [ 3200.587744] ? cgroup_destroy_locked+0x710/0x710 [ 3200.587767] kernfs_iop_mkdir+0x14d/0x1e0 [ 3200.587793] vfs_mkdir+0x424/0x680 [ 3200.587816] do_mkdirat+0x145/0x2a0 [ 3200.587836] ? user_path_create+0xf0/0xf0 [ 3200.587860] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3200.587881] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3200.587910] do_syscall_64+0x33/0x40 [ 3200.587931] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3200.587943] RIP: 0033:0x7f4c4e303b19 [ 3200.587962] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3200.587972] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3200.587993] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 14:50:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e97"], 0x130) [ 3200.588003] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3200.588014] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3200.588025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3200.588035] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 [ 3200.775770] FAULT_INJECTION: forcing a failure. [ 3200.775770] name failslab, interval 1, probability 0, space 0, times 0 [ 3200.775792] CPU: 1 PID: 14548 Comm: syz-executor.2 Not tainted 5.10.175 #1 14:50:15 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 17) [ 3200.775802] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3200.775808] Call Trace: [ 3200.775831] dump_stack+0x107/0x167 [ 3200.775856] should_fail.cold+0x5/0xa [ 3200.775884] ? __kernfs_new_node+0xd4/0x850 [ 3200.775906] should_failslab+0x5/0x20 [ 3200.775924] kmem_cache_alloc+0x5b/0x360 [ 3200.775952] __kernfs_new_node+0xd4/0x850 [ 3200.775978] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3200.776007] ? rcu_read_lock_sched_held+0x3e/0x80 [ 3200.776023] ? pcpu_alloc+0x12a/0x1360 [ 3200.776051] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 3200.776083] kernfs_create_dir_ns+0x9c/0x230 [ 3200.776111] cgroup_mkdir+0x318/0xfe0 [ 3200.776138] ? cgroup_destroy_locked+0x710/0x710 [ 3200.776161] kernfs_iop_mkdir+0x14d/0x1e0 [ 3200.776187] vfs_mkdir+0x424/0x680 [ 3200.776209] do_mkdirat+0x145/0x2a0 [ 3200.776230] ? user_path_create+0xf0/0xf0 [ 3200.776255] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3200.776274] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3200.776300] do_syscall_64+0x33/0x40 [ 3200.776321] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3200.776333] RIP: 0033:0x7f4c4e303b19 [ 3200.776352] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3200.776362] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3200.776382] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3200.776393] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3200.776404] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3200.776414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3200.776425] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 [ 3200.888947] FAULT_INJECTION: forcing a failure. [ 3200.888947] name failslab, interval 1, probability 0, space 0, times 0 [ 3200.888969] CPU: 1 PID: 14553 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3200.888979] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3200.888985] Call Trace: [ 3200.889007] dump_stack+0x107/0x167 [ 3200.889034] should_fail.cold+0x5/0xa [ 3200.889056] ? create_object.isra.0+0x3a/0xa20 [ 3200.889078] should_failslab+0x5/0x20 [ 3200.889097] kmem_cache_alloc+0x5b/0x360 [ 3200.889123] create_object.isra.0+0x3a/0xa20 [ 3200.889143] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3200.889168] kmem_cache_alloc+0x159/0x360 [ 3200.889198] __kernfs_new_node+0xd4/0x850 [ 3200.889225] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3200.889258] ? rcu_read_lock_sched_held+0x3e/0x80 [ 3200.889275] ? pcpu_alloc+0x12a/0x1360 [ 3200.889303] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 3200.889335] kernfs_create_dir_ns+0x9c/0x230 [ 3200.889365] cgroup_mkdir+0x318/0xfe0 [ 3200.889395] ? cgroup_destroy_locked+0x710/0x710 [ 3200.889424] kernfs_iop_mkdir+0x14d/0x1e0 [ 3200.889456] vfs_mkdir+0x424/0x680 [ 3200.889492] do_mkdirat+0x145/0x2a0 [ 3200.929363] ? user_path_create+0xf0/0xf0 [ 3200.929390] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3200.929409] ? syscall_enter_from_user_mode+0x1d/0x50 14:50:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e97"], 0x130) [ 3200.929436] do_syscall_64+0x33/0x40 [ 3200.929458] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3200.929470] RIP: 0033:0x7f4c4e303b19 [ 3200.929489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3200.929499] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3200.929520] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3200.929531] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3200.929541] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3200.929552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3200.929563] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 [ 3201.020918] Process accounting resumed [ 3201.066497] Process accounting resumed 14:50:16 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0x78) splice(r3, 0x0, r1, 0x0, 0x7b, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs_stats_percpu\x00') [ 3201.184689] Process accounting resumed 14:50:16 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 18) 14:50:16 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r3 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000002c0)={[{@mblk_io_submit}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@sysvgroups}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:50:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xde}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file1\x00'}) r2 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x31e, 0x0) perf_event_open$cgroup(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x8, 0x1, 0x7, 0x0, 0x1aea, 0x1000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x2}, 0x401, 0x3f, 0x1, 0x3, 0x5, 0x7fffffff, 0x2, 0x0, 0x7ff, 0x0, 0xfffffffffffffffe}, r1, 0xe, r2, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r3, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r4 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r5 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r4, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) [ 3201.311124] FAULT_INJECTION: forcing a failure. [ 3201.311124] name failslab, interval 1, probability 0, space 0, times 0 [ 3201.311145] CPU: 0 PID: 14570 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3201.311154] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3201.311159] Call Trace: [ 3201.311180] dump_stack+0x107/0x167 [ 3201.311203] should_fail.cold+0x5/0xa [ 3201.311225] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 3201.311251] should_failslab+0x5/0x20 [ 3201.311270] kmem_cache_alloc+0x5b/0x360 [ 3201.311296] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 3201.311321] idr_get_free+0x4b5/0x8f0 [ 3201.311355] idr_alloc_u32+0x170/0x2d0 [ 3201.311377] ? __fprop_inc_percpu_max+0x130/0x130 [ 3201.311398] ? lock_acquire+0x197/0x4a0 [ 3201.311415] ? __kernfs_new_node+0xff/0x850 [ 3201.311440] idr_alloc_cyclic+0x102/0x230 [ 3201.311458] ? idr_alloc+0x130/0x130 [ 3201.311473] ? rwlock_bug.part.0+0x90/0x90 [ 3201.311504] __kernfs_new_node+0x117/0x850 [ 3201.311528] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3201.311553] ? rcu_read_lock_sched_held+0x3e/0x80 [ 3201.311567] ? pcpu_alloc+0x12a/0x1360 [ 3201.311592] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 3201.311620] kernfs_create_dir_ns+0x9c/0x230 [ 3201.311645] cgroup_mkdir+0x318/0xfe0 [ 3201.311669] ? cgroup_destroy_locked+0x710/0x710 [ 3201.311689] kernfs_iop_mkdir+0x14d/0x1e0 [ 3201.311712] vfs_mkdir+0x424/0x680 [ 3201.311733] do_mkdirat+0x145/0x2a0 [ 3201.311751] ? user_path_create+0xf0/0xf0 [ 3201.311772] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3201.311788] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3201.311811] do_syscall_64+0x33/0x40 [ 3201.311830] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3201.311841] RIP: 0033:0x7f4c4e303b19 [ 3201.311857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3201.311866] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3201.311884] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3201.311893] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3201.311902] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3201.311912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3201.311921] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 14:50:34 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r3 = syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000180)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000002c0)={[{@mblk_io_submit}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@sysvgroups}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:50:34 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, 0x0) r0 = syz_open_dev$hiddev(0x0, 0x6, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1, 0x4, 0x5) r1 = syz_io_uring_setup(0x1556, &(0x7f0000000180)={0x0, 0x0, 0x1, 0x0, 0x73}, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x7d62, &(0x7f0000000040)={0x0, 0x55a0, 0x8, 0x1, 0x28c, 0x0, r1}, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000100)=0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) r5 = openat$incfs(0xffffffffffffffff, &(0x7f0000001840)='.pending_reads\x00', 0x80000, 0x0) pidfd_getfd(0xffffffffffffffff, r5, 0x0) recvmmsg(r4, &(0x7f00000019c0)=[{{&(0x7f0000000140)=@isdn, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, &(0x7f0000000280)=""/144, 0x90}, 0x6}, {{&(0x7f0000000340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)=""/179, 0xb3}, {&(0x7f0000000480)=""/66, 0x42}, {&(0x7f0000000500)=""/152, 0x98}, {&(0x7f00000005c0)=""/101, 0x65}, {&(0x7f0000000640)=""/4096, 0x1000}], 0x5, &(0x7f00000016c0)=""/203, 0xcb}, 0x8001}, {{&(0x7f00000017c0)=@can, 0x80, &(0x7f0000001840)}, 0x4}, {{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001880)=""/108, 0x6c}, {&(0x7f0000001900)=""/29, 0x1d}], 0x2, &(0x7f0000001980)=""/10, 0xa}, 0x10001}], 0x4, 0x20, &(0x7f0000001ac0)={0x0, 0x3938700}) syz_io_uring_submit(r2, r3, &(0x7f0000001480)=@IORING_OP_WRITEV={0x2, 0x5, 0x4004, @fd=r4, 0x9, &(0x7f0000001440)=[{&(0x7f0000001280)="927061cc3abeb1f2421140408c7c55cb0ea2876d9363d8f36170851139c9be0b71dd3e5d511a5038f4daa8703471246662c422a6455ad1519b7a6d0a1c9545400fcf2bec92640bc79ab9f09de8f08038a4305fec0f84e1044ed261802165acff4f4d99af1845e26a03319a3bc60f41d80992114f4de3a4099c3616c0308988a37bccbaa04ee00fc5a319268d37548ca82ce3e5a755718e2363c9550f6ac0cd75", 0xa0}, {&(0x7f0000000140)="4b751cd371416e0ea80ccdca8199d1e4583eb6f8ec1dd4018b6de18cdc1109aa8e134ef68f232a10672742e017847db346b04da06949fd7aaf5e6fa3", 0x3c}, {&(0x7f0000001340)="0e755f9c4f2c40dcad1921de5465550d9b70d3312d229e2441b7ae7921a3dfcf439e8e057a48280293bfe9f625b12b797ca11ead886a30d2c9ed44b2dc9b9b65e8187a7960a05f8f61e406f4f1306b9531a347c6955cfe77e86bfd2dcfa4bfef2e286c9ccd6f40c1d0a7f3e6540efc4688c4ef7a17805a8afea26dd33a43702161f1229f21e455ad40", 0x89}, {&(0x7f0000001400)="340a9b51e7", 0x5}], 0x4, 0x11, 0x0, {0x1}}, 0xfd) 14:50:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0x0, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:50:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r3, 0x31e, 0x0) getdents(r3, &(0x7f0000000580)=""/4096, 0x1000) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) mknod(&(0x7f0000000040)='./file1\x00', 0x10, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:50:34 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568c"], 0x130) 14:50:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 19) 14:50:34 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) r3 = perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r4 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) r5 = signalfd(r3, &(0x7f0000000200), 0x8) move_mount(r4, &(0x7f0000000180)='./file0\x00', r5, &(0x7f0000000240)='./file0\x00', 0x20) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:50:34 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) ioctl$BTRFS_IOC_SEND(0xffffffffffffffff, 0x40489426, &(0x7f0000000300)={{}, 0x5, &(0x7f00000002c0)=[0x6, 0x1000000000000003, 0x2, 0x7, 0x0], 0x71, 0x4, [0x100000000, 0x4, 0x10000, 0xda7]}) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0x78) write(r2, &(0x7f0000000100)="6347389a02233485ff25a7dde1bb0d71ae91267c7c3258c0e97743d30d1217aeb2f368886e9d4a533fb472433e310e7cb36eaf4a398a0e6902ca62f5261e7b1324b329070e2526690f9c11685743f1839b904a64ac4309a9f6bc23a382e266d25a", 0x61) r3 = openat2(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000240)={0x840400, 0x10, 0x3}, 0x18) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r4, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept(r4, 0x0, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000200)={0xa000000a}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/sysrq', 0x442040, 0x1) [ 3219.706901] FAULT_INJECTION: forcing a failure. [ 3219.706901] name failslab, interval 1, probability 0, space 0, times 0 14:50:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a2649cc55aa09997b19022ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89275c29c7decb81fb950000000040ddb827b44d010c05a5c98e52702b059eac222eecbad64abf414366a40197eedcfb2181ed287fad9c290de202b64349f90652599f5e5502d5904084eb98ef37f66802e57c187ad97551d2037eb89eb8e26cc6127a28b406a5e9949a381bdf78028030bf89fd805a0c9ac7798552125b8581902a347753c1a6272a382ee89fab33af8d2e27ae4ce599e6e84fcf15", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 20) [ 3219.706924] CPU: 0 PID: 14593 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3219.706934] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3219.706940] Call Trace: [ 3219.706964] dump_stack+0x107/0x167 [ 3219.706991] should_fail.cold+0x5/0xa [ 3219.707013] ? create_object.isra.0+0x3a/0xa20 [ 3219.707035] should_failslab+0x5/0x20 [ 3219.707053] kmem_cache_alloc+0x5b/0x360 [ 3219.707081] create_object.isra.0+0x3a/0xa20 [ 3219.707100] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3219.707127] kmem_cache_alloc+0x159/0x360 [ 3219.707160] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 3219.707189] idr_get_free+0x4b5/0x8f0 [ 3219.707228] idr_alloc_u32+0x170/0x2d0 14:50:34 executing program 7: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept(r1, 0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000001640)={0x0, 0x0}) recvmmsg(r1, &(0x7f00000016c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/45, 0x2d}, {&(0x7f00000014c0)=""/2, 0x2}], 0x2, &(0x7f00000001c0)=""/16, 0x10}, 0x8}, {{&(0x7f0000000280)=@un=@abs, 0x80, &(0x7f0000000940)=[{&(0x7f0000000300)=""/239, 0xef}, {&(0x7f0000000400)=""/129, 0x81}, {&(0x7f00000004c0)=""/176, 0xb0}, {&(0x7f0000000580)=""/82, 0x52}, {&(0x7f0000000600)=""/15, 0xf}, {&(0x7f0000000640)=""/238, 0xee}, {&(0x7f0000000740)=""/82, 0x52}, {&(0x7f00000007c0)=""/216, 0xd8}, {&(0x7f00000008c0)=""/77, 0x4d}], 0x9, &(0x7f0000000a00)=""/253, 0xfd}, 0x5}, {{&(0x7f0000000b00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000b80)=""/217, 0xd9}, {&(0x7f0000000c80)=""/86, 0x56}, {&(0x7f0000000d00)=""/41, 0x29}], 0x3, &(0x7f0000000d80)=""/178, 0xb2}, 0x7}, {{0x0, 0x0, 0xfffffffffffffffe, 0x0, &(0x7f0000000e40)=""/90, 0x5a}, 0x3}, {{&(0x7f0000000ec0)=@nfc, 0x80, &(0x7f00000011c0)=[{&(0x7f0000000f40)=""/80, 0x50}, {&(0x7f0000000fc0)=""/209, 0xd1}, {&(0x7f00000010c0)=""/194, 0xc2}], 0x3}, 0x1}, {{&(0x7f0000001200)=@hci, 0x80, &(0x7f0000001400)=[{&(0x7f0000001280)=""/40, 0x28}, {&(0x7f00000012c0)=""/224, 0xe0}, {&(0x7f00000013c0)=""/59, 0x3b}], 0x3, &(0x7f0000001440)=""/127, 0x7f}, 0x8}], 0x6, 0x2101, &(0x7f0000001680)={r2, r3+10000000}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x46842, 0x0) io_setup(0x5, &(0x7f0000000080)=0x0) io_submit(r5, 0x2, &(0x7f0000000180)=[&(0x7f0000000200)={0x0, 0x0, 0xd, 0x1, 0x0, r4, 0x0, 0xffffffc8}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 3219.707258] ? __fprop_inc_percpu_max+0x130/0x130 [ 3219.707283] ? lock_acquire+0x197/0x4a0 [ 3219.707303] ? __kernfs_new_node+0xff/0x850 [ 3219.707333] idr_alloc_cyclic+0x102/0x230 [ 3219.707354] ? idr_alloc+0x130/0x130 [ 3219.707371] ? rwlock_bug.part.0+0x90/0x90 [ 3219.707408] __kernfs_new_node+0x117/0x850 [ 3219.707435] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3219.707465] ? rcu_read_lock_sched_held+0x3e/0x80 [ 3219.707481] ? pcpu_alloc+0x12a/0x1360 14:50:34 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568c"], 0x130) [ 3219.707510] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 3219.707543] kernfs_create_dir_ns+0x9c/0x230 [ 3219.707575] cgroup_mkdir+0x318/0xfe0 [ 3219.707603] ? cgroup_destroy_locked+0x710/0x710 [ 3219.707627] kernfs_iop_mkdir+0x14d/0x1e0 [ 3219.707653] vfs_mkdir+0x424/0x680 [ 3219.707677] do_mkdirat+0x145/0x2a0 [ 3219.707698] ? user_path_create+0xf0/0xf0 [ 3219.707723] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3219.707742] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3219.707770] do_syscall_64+0x33/0x40 [ 3219.707791] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3219.707803] RIP: 0033:0x7f4c4e303b19 [ 3219.707822] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3219.707832] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3219.707853] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3219.707864] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3219.707875] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3219.707885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:50:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 21) [ 3219.707896] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 [ 3219.859860] FAULT_INJECTION: forcing a failure. [ 3219.859860] name failslab, interval 1, probability 0, space 0, times 0 [ 3219.859876] CPU: 1 PID: 14608 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3219.859884] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3219.859889] Call Trace: [ 3219.859906] dump_stack+0x107/0x167 [ 3219.859926] should_fail.cold+0x5/0xa [ 3219.859945] ? selinux_kernfs_init_security+0x137/0x4c0 [ 3219.859962] should_failslab+0x5/0x20 [ 3219.859974] __kmalloc+0x72/0x330 [ 3219.859996] selinux_kernfs_init_security+0x137/0x4c0 [ 3219.860011] ? selinux_file_mprotect+0x610/0x610 [ 3219.860025] ? find_held_lock+0x2c/0x110 [ 3219.860046] ? __kernfs_new_node+0x2ad/0x850 [ 3219.860062] ? lock_downgrade+0x6d0/0x6d0 [ 3219.860083] ? rwlock_bug.part.0+0x90/0x90 [ 3219.860111] security_kernfs_init_security+0x4e/0xb0 [ 3219.860139] __kernfs_new_node+0x531/0x850 [ 3219.860166] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3219.860192] ? rcu_read_lock_sched_held+0x3e/0x80 [ 3219.860206] ? pcpu_alloc+0x12a/0x1360 [ 3219.860228] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 3219.860260] kernfs_create_dir_ns+0x9c/0x230 [ 3219.860286] cgroup_mkdir+0x318/0xfe0 [ 3219.860310] ? cgroup_destroy_locked+0x710/0x710 [ 3219.860332] kernfs_iop_mkdir+0x14d/0x1e0 [ 3219.860353] vfs_mkdir+0x424/0x680 [ 3219.860371] do_mkdirat+0x145/0x2a0 [ 3219.860389] ? user_path_create+0xf0/0xf0 [ 3219.860411] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3219.860430] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3219.860451] do_syscall_64+0x33/0x40 [ 3219.860469] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3219.860480] RIP: 0033:0x7f4c4e303b19 [ 3219.860496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3219.860505] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3219.860522] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3219.860531] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3219.860542] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3219.860554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3219.860564] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 14:50:34 executing program 7: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) [ 3220.066768] FAULT_INJECTION: forcing a failure. [ 3220.066768] name failslab, interval 1, probability 0, space 0, times 0 [ 3220.069045] CPU: 0 PID: 14622 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3220.070236] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3220.071637] Call Trace: [ 3220.072094] dump_stack+0x107/0x167 [ 3220.072725] should_fail.cold+0x5/0xa [ 3220.073376] ? create_object.isra.0+0x3a/0xa20 [ 3220.074173] should_failslab+0x5/0x20 [ 3220.074823] kmem_cache_alloc+0x5b/0x360 [ 3220.075518] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3220.076346] create_object.isra.0+0x3a/0xa20 [ 3220.077097] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3220.077967] __kmalloc+0x16e/0x330 [ 3220.078607] selinux_kernfs_init_security+0x137/0x4c0 [ 3220.079484] ? selinux_file_mprotect+0x610/0x610 [ 3220.080297] ? find_held_lock+0x2c/0x110 [ 3220.080999] ? __kernfs_new_node+0x2ad/0x850 [ 3220.081758] ? lock_downgrade+0x6d0/0x6d0 [ 3220.082481] ? rwlock_bug.part.0+0x90/0x90 [ 3220.083207] security_kernfs_init_security+0x4e/0xb0 [ 3220.084070] __kernfs_new_node+0x531/0x850 [ 3220.084799] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3220.085609] ? rcu_read_lock_sched_held+0x3e/0x80 [ 3220.086449] ? pcpu_alloc+0x12a/0x1360 [ 3220.087115] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 3220.088012] kernfs_create_dir_ns+0x9c/0x230 [ 3220.088763] cgroup_mkdir+0x318/0xfe0 [ 3220.089409] ? cgroup_destroy_locked+0x710/0x710 [ 3220.090217] kernfs_iop_mkdir+0x14d/0x1e0 [ 3220.090930] vfs_mkdir+0x424/0x680 [ 3220.091546] do_mkdirat+0x145/0x2a0 [ 3220.092165] ? user_path_create+0xf0/0xf0 [ 3220.092868] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3220.093750] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3220.094643] do_syscall_64+0x33/0x40 [ 3220.095278] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3220.096149] RIP: 0033:0x7f4c4e303b19 [ 3220.096779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3220.099907] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3220.101187] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3220.102394] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3220.103591] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3220.104790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3220.105987] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 14:50:52 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) pwrite64(r0, &(0x7f0000000240)="839ae926a39364d63d445f65929a9169004fc1b8f1b159757d8836f4f6b18788328571f0622decc8bf82ee5451c97e64194a6ccfec3fd3e169fab40e608b34bd1733ccdce02636482c83dcefa90ac168b740e47676ffaa78c2c1d5b3907c18f82a2b97704b2c980d85b9cd78849fed90b905f0b517eb1e2e77f037a9d134a26e8696c09c752d24f5e62a92ede72bb83ff399a337517af778b831c3e4f678d12a6e4f8b00c989223acf9fe1a2112197ecf17f53b2db37eea04aba66b627a3078941062bc905fd52980e1b31cb0c2a4eb76bdac8b70bf393f4970aa54c23c98fb491e9dd6f7b60212d", 0xe8, 0x5) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r2, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept(r2, 0x0, &(0x7f0000000100)) ioctl$FICLONE(r2, 0x40049409, r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r1, 0x0, 0x7b, 0x0) 14:50:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0x0, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:50:52 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568c"], 0x130) 14:50:52 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000001c0)='discard') ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r2, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r3 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r3, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:50:52 executing program 3: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_TESTMODE(0xffffffffffffffff, 0x0, 0x8001) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x110) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0x8}, @val={0xc}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_REG(r0, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0x188, r1, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_REG_RULES={0x110, 0x22, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0xff}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0xbcdf}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x81}]}, {0x34, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x4}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0xfffffffb}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x3}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xbc}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x2}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8}]}, {0x14, 0x0, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x7ff}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x10001}]}, {0x34, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x632d0480}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x4}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x7}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x7b3}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x7}, @NL80211_ATTR_REG_RULE_FLAGS={0x8}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x7}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x5}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0xfff}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x7}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x89}]}, {0x14, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x5}, @NL80211_ATTR_FREQ_RANGE_START={0x8}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x5}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x3ff}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x20}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x4}]}]}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_REG_RULES={0x48, 0x22, 0x0, 0x1, [{0x24, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x8}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0xffff}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0xea35}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0xfff}]}, {0x4}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x1ff}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x1}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x400}]}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x20000000}, 0x200004c0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:50:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000500)={0x1f, 0x0, @fixed, 0xffff}, 0xe) r0 = inotify_init1(0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) fsmount(r2, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x62, 0xfd, 0x8, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0xffffffffffffffff, 0xffffffffff000000, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r4, 0x31e, 0x0) inotify_add_watch(r4, &(0x7f00000003c0)='./file0/file0\x00', 0x200) readv(r2, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/216, 0xd8}, {&(0x7f0000000340)=""/105, 0x69}], 0x2) socket$nl_generic(0x10, 0x3, 0x10) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000080), 0xf) ioctl$AUTOFS_DEV_IOCTL_VERSION(r3, 0xc0189371, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$SG_SET_COMMAND_Q(r5, 0x2271, &(0x7f0000000440)=0x1) 14:50:52 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a2649cc55aa09997b19022ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89275c29c7decb81fb950000000040ddb827b44d010c05a5c98e52702b059eac222eecbad64abf414366a40197eedcfb2181ed287fad9c290de202b64349f90652599f5e5502d5904084eb98ef37f66802e57c187ad97551d2037eb89eb8e26cc6127a28b406a5e9949a381bdf78028030bf89fd805a0c9ac7798552125b8581902a347753c1a6272a382ee89fab33af8d2e27ae4ce599e6e84fcf15", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 22) 14:50:52 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) recvmmsg(r2, &(0x7f00000019c0)=[{{&(0x7f0000000140)=@isdn, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, &(0x7f0000000280)=""/144, 0x90}, 0x6}, {{&(0x7f0000000340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)=""/179, 0xb3}, {&(0x7f0000000480)=""/66, 0x42}, {&(0x7f0000000500)=""/152, 0x98}, {&(0x7f00000005c0)=""/101, 0x65}, {&(0x7f0000000640)=""/4096, 0x1000}], 0x5, &(0x7f00000016c0)=""/203, 0xcb}, 0x8001}, {{&(0x7f00000017c0)=@can, 0x80, &(0x7f0000001840)}, 0x4}, {{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001880)=""/108, 0x6c}, {&(0x7f0000001900)=""/29, 0x1d}], 0x2, &(0x7f0000001980)=""/10, 0xa}, 0x10001}], 0x4, 0x20, &(0x7f0000001ac0)={0x0, 0x3938700}) dup2(r0, r2) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r3 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r3, 0x5609, 0x0) r4 = creat(0x0, 0x1) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r5 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r4, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) [ 3237.461543] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 3237.472047] FAULT_INJECTION: forcing a failure. [ 3237.472047] name failslab, interval 1, probability 0, space 0, times 0 14:50:52 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r2, 0x541c, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f00000001c0)=@v2={0x2000000, [{0x8, 0x4}, {0x9, 0x4}]}, 0x14, 0x3) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r3 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r3, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) [ 3237.474800] CPU: 1 PID: 14638 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3237.474812] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3237.474818] Call Trace: [ 3237.474842] dump_stack+0x107/0x167 [ 3237.474869] should_fail.cold+0x5/0xa 14:50:52 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 23) [ 3237.474899] should_failslab+0x5/0x20 [ 3237.474919] __kmalloc_track_caller+0x79/0x310 [ 3237.474936] ? security_context_to_sid_core+0xb4/0x890 [ 3237.474966] kmemdup_nul+0x2d/0xa0 [ 3237.474986] security_context_to_sid_core+0xb4/0x890 [ 3237.475014] ? security_compute_sid.part.0+0x16e0/0x16e0 [ 3237.475036] ? do_raw_spin_lock+0x121/0x260 [ 3237.475058] ? rwlock_bug.part.0+0x90/0x90 [ 3237.475077] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3237.475104] ? do_raw_spin_unlock+0x4f/0x220 [ 3237.475126] ? _raw_spin_unlock+0x1a/0x30 [ 3237.475152] security_context_to_sid+0x35/0x50 [ 3237.475180] selinux_kernfs_init_security+0x19d/0x4c0 [ 3237.475199] ? selinux_file_mprotect+0x610/0x610 [ 3237.475217] ? find_held_lock+0x2c/0x110 [ 3237.475250] ? __kernfs_new_node+0x2ad/0x850 [ 3237.475270] ? lock_downgrade+0x6d0/0x6d0 [ 3237.475293] ? rwlock_bug.part.0+0x90/0x90 [ 3237.475324] security_kernfs_init_security+0x4e/0xb0 [ 3237.475348] __kernfs_new_node+0x531/0x850 [ 3237.475375] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3237.475405] ? rcu_read_lock_sched_held+0x3e/0x80 [ 3237.475422] ? pcpu_alloc+0x12a/0x1360 [ 3237.475450] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 3237.475483] kernfs_create_dir_ns+0x9c/0x230 [ 3237.475512] cgroup_mkdir+0x318/0xfe0 [ 3237.475540] ? cgroup_destroy_locked+0x710/0x710 [ 3237.475564] kernfs_iop_mkdir+0x14d/0x1e0 14:50:52 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xa82c3, 0x1e0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = epoll_create(0x3) fallocate(0xffffffffffffffff, 0x4c, 0x5b, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r4, 0x40189429, &(0x7f0000000080)={0x0, 0x3, 0xfffffffffffffeff}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r6, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000100)={0x30, r5, 0x1, 0x0, 0x0, {{}, {@void, @val={0x8}, @val={0xc}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r8}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_ABORT_SCAN(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r8}, @val={0xc, 0x99, {0x9864, 0x61}}}}, ["", "", "", "", "", "", "", "", ""]}, 0x28}}, 0x801) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLCREATE(r3, &(0x7f0000000240)={0x18, 0xf, 0x2, {{0x1, 0x0, 0x1}, 0x1f}}, 0x18) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x2000000, 0x3, 0xfffffffffffffffd}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) [ 3237.475591] vfs_mkdir+0x424/0x680 [ 3237.475614] do_mkdirat+0x145/0x2a0 [ 3237.475636] ? user_path_create+0xf0/0xf0 14:50:52 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cec"], 0x130) [ 3237.475661] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3237.475678] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3237.475706] do_syscall_64+0x33/0x40 [ 3237.475728] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3237.475741] RIP: 0033:0x7f4c4e303b19 [ 3237.475760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3237.475771] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3237.475792] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3237.475803] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3237.475814] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3237.475825] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3237.475836] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 [ 3237.549813] EXT4-fs (loop7): Unrecognized mount option "./file0" or missing value [ 3237.668874] FAULT_INJECTION: forcing a failure. [ 3237.668874] name failslab, interval 1, probability 0, space 0, times 0 [ 3237.668934] CPU: 1 PID: 14662 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3237.668946] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3237.668953] Call Trace: [ 3237.668977] dump_stack+0x107/0x167 [ 3237.669006] should_fail.cold+0x5/0xa [ 3237.669029] ? create_object.isra.0+0x3a/0xa20 [ 3237.669053] should_failslab+0x5/0x20 [ 3237.669073] kmem_cache_alloc+0x5b/0x360 [ 3237.669102] create_object.isra.0+0x3a/0xa20 [ 3237.669123] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3237.669151] __kmalloc_track_caller+0x177/0x310 [ 3237.669170] ? security_context_to_sid_core+0xb4/0x890 [ 3237.669209] kmemdup_nul+0x2d/0xa0 [ 3237.669233] security_context_to_sid_core+0xb4/0x890 [ 3237.669264] ? security_compute_sid.part.0+0x16e0/0x16e0 [ 3237.669286] ? do_raw_spin_lock+0x121/0x260 [ 3237.669309] ? rwlock_bug.part.0+0x90/0x90 [ 3237.669328] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3237.669357] ? do_raw_spin_unlock+0x4f/0x220 [ 3237.669381] ? _raw_spin_unlock+0x1a/0x30 [ 3237.669408] security_context_to_sid+0x35/0x50 [ 3237.669437] selinux_kernfs_init_security+0x19d/0x4c0 [ 3237.669458] ? selinux_file_mprotect+0x610/0x610 [ 3237.669476] ? find_held_lock+0x2c/0x110 [ 3237.669507] ? __kernfs_new_node+0x2ad/0x850 [ 3237.669528] ? lock_downgrade+0x6d0/0x6d0 [ 3237.669552] ? rwlock_bug.part.0+0x90/0x90 [ 3237.669585] security_kernfs_init_security+0x4e/0xb0 [ 3237.669610] __kernfs_new_node+0x531/0x850 [ 3237.669639] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3237.669670] ? rcu_read_lock_sched_held+0x3e/0x80 [ 3237.669688] ? pcpu_alloc+0x12a/0x1360 [ 3237.669717] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 3237.669752] kernfs_create_dir_ns+0x9c/0x230 [ 3237.669786] cgroup_mkdir+0x318/0xfe0 [ 3237.669815] ? cgroup_destroy_locked+0x710/0x710 [ 3237.669841] kernfs_iop_mkdir+0x14d/0x1e0 [ 3237.669869] vfs_mkdir+0x424/0x680 [ 3237.669893] do_mkdirat+0x145/0x2a0 [ 3237.669916] ? user_path_create+0xf0/0xf0 [ 3237.669946] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3237.669970] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3237.670008] do_syscall_64+0x33/0x40 [ 3237.670035] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3237.670049] RIP: 0033:0x7f4c4e303b19 [ 3237.670070] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3237.670081] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3237.670104] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3237.670116] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3237.670127] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3237.670139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3237.670151] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 14:51:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 24) 14:51:06 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0x78) splice(r0, 0x0, r1, 0x0, 0x8000007b, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000100)) 14:51:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0x0, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:51:06 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "3777bec46cadbec271ef1a0c69089f0d25ae7e7eef5c3a9c2b7a75238240879af13fa9a798e9414746c82eeed7c3f61051ead3fd4f7852fc8398ced850c9faa4a7a4362f97e73a13b24a40d6b0c43dd359291244538f69e9f69f8d4235d6f87e205032e1fd6a33d9c2ad298732eac946a3c526c60bfccffde72b341101c6b716b285b64d9d48359c351b9c960d5e98a3e7705b2f1709a04425eea4914a3e19b8c51bfa05ee967a769b2e8f29313bdc98539e92d6bbddedb92a7367b3c4a90000e595f3469efc0873f277db1bfce53714129dbbb15961bf618a48771abbef15e4e54aa8fe83deda7b230c9613af597bd8d2cf95c827862926aa3c1fb38092"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cec"], 0x130) 14:51:06 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept(r1, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8982, &(0x7f0000000000)={0x7, 'veth1\x00', {0x4c}, 0x5}) setsockopt$inet6_mreq(r0, 0x29, 0x12, 0x0, 0x0) 14:51:06 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000000780)={0x0, 0x0}) r3 = creat(&(0x7f00000007c0)='./file0\x00', 0x6) perf_event_open(&(0x7f0000000700)={0x6, 0x80, 0x5, 0xa9, 0x6, 0x0, 0x0, 0xffffffff, 0x10, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x900, 0x1, @perf_config_ext={0x8000, 0x6}, 0x4, 0x0, 0x101, 0x0, 0xf45d, 0x2, 0x101, 0x0, 0x4, 0x0, 0xff}, r2, 0x10, r3, 0x8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='memory.numa_stat\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000006c0)={0x0, r4, 0x6, 0xfffffffffffffff7, 0x3b, 0xffffffff}) setresuid(0xffffffffffffffff, r1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x80000, 0x6, &(0x7f0000000540)=[{&(0x7f0000000080)="7916a94605b3d74242d1377ae1f9e337b9dbdb439edd69f39ec6c7823d396b8d93c29db006983510d7e6aa0447a496a6d7a5068d8374b84cf5845db073fee081232dbf7a98a9c9460d6f5eedf930c84a3f665fdd668133f1db82315be693f61693e349215aba71159ba32615e949bfc7b5092664", 0x74, 0x83}, {&(0x7f0000000100)="569ffe732b32a92b73b20c5c9657b0d572a8b5e9640f4594070ca507e271499f06d80f4785364ccd5af37ba0142a21b0272ff8e288cbedfb93a254db9258d7b21ed0e14e741d02c5848e2d979e1b7810faaf99a09080eba228786fa4a7d9842eaa5249f32371c774ca3a3d80990625de3b17637161a4d8772e07a50dad030686f8c87eb7fdc42847cbccc27f2c1d777d525cc53dc3bf6fa490f5a89c5200added387b0e799a8e1be9df774f026b7b7a78ada5c07644172360b15ad52577a412b3ed620e1d0e02f710eadbb2a6acc9ac855da1ff58e7be8db77b0ec8ada85c7434c2ab0fa11992d462431a289764de0a2b342a546", 0xf4, 0x100}, {&(0x7f0000000280)="fcaf52bb9fb6da2a", 0x8, 0x8284}, {&(0x7f00000002c0)="8577b6909607b52e4d0ef977b6f2069ec2f24da6edd24effe90bf83e8dadd61848e9d78c085517d9597dc09c8bb807646cb3df5c6fb23d81b6f19f70b8a28a14735bc7c6a6d4e7ad84ae27ac051efce35c6f95977237a7da580cfca97826cab0d92924fd96ce33814f5225aea174d8e8338778fd03bf595ce351a5db728c61d47ee9b309da8fa29a1aff2dd4d55da258d6ba34ddfb3a961495a78276318496ba1c63a07094bd5c9745b0ad", 0xab, 0x80000000}, {&(0x7f0000000380)="921a0981f10ac34ee6667359dba6edc760a6aaabc609e38cbc022dcabaca53369ed4809bb3baf3bdc25566c02784e38bd655380aaf18d06951f98b190d41d567e35f732cba7bd8f4b20c4354e861775ce1b76e9f82ec247f36dad7bf8c069ae350119f5ff7931b69d5a4eb37660d31b305cb39d032dbe67b6fe894690f5f7dbbd62ab0d14a6f1863c2a0a250233368e883d31f78472df8f008dc97e1b372cef3f94fff5b5f900abe03b5f36f8c1259f9a7b8ccafe7fd14de1ac1c6d089e870aa33e39b8d74caf33ad9c22400182b6900c9f0bbecfe372d3834493e7fa460372827dd5427284797ccf04e6d", 0xeb, 0x101}, {&(0x7f0000000480)="8d054c294fb5b2400c6556c4e15b3227d2823046f5b6b916cf4662b4906a92388997187052edec6b21595deb8c89ee7578888910aa33808026800817f60e7910905c5645bd6f343947d76b7c33b713d5012409f62008a015f4694839a856967e4168ce306ef338812a0842473c11297c4d3d178e4cd1a32d99acfb285e38ec170fe41df6ee9de738611708434d33115e01d5645dc8508a48abb5a62c286bb01bd25976205f71f25defda0e93d3af9ebfa741062255c9881c586a0265faaf7d", 0xbf, 0xffffffffffffff2a}], 0x1000020, &(0x7f0000000600)=ANY=[@ANYBLOB='uni_xlate=0,smackfsdef=,seclabel,fowner>', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=r1, @ANYBLOB="2c6d61736b3d4d41595f57524954452c736d61636b66736861743d283a20852c00"]) 14:51:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) recvmmsg(r4, &(0x7f00000019c0)=[{{&(0x7f0000000140)=@isdn, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, &(0x7f0000000280)=""/144, 0x90}, 0x6}, {{&(0x7f0000000340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)=""/179, 0xb3}, {&(0x7f0000000480)=""/66, 0x42}, {&(0x7f0000000500)=""/152, 0x98}, {&(0x7f00000005c0)=""/101, 0x65}, {&(0x7f0000000640)=""/4096, 0x1000}], 0x5, &(0x7f00000016c0)=""/203, 0xcb}, 0x8001}, {{&(0x7f00000017c0)=@can, 0x80, &(0x7f0000001840)}, 0x4}, {{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001880)=""/108, 0x6c}, {&(0x7f0000001900)=""/29, 0x1d}], 0x2, &(0x7f0000001980)=""/10, 0xa}, 0x10001}], 0x4, 0x20, &(0x7f0000001ac0)={0x0, 0x3938700}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@ipv4={""/10, ""/2, @private}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000200)=0xe8) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x100000, &(0x7f0000000580)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@noextend}, {@uname={'uname', 0x3d, '%$'}}, {@loose}, {@version_L}], [{@fowner_gt={'fowner>', r5}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@uid_lt={'uid<', 0xee00}}]}}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:51:06 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x8, 0x100000000}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x4800, 0x9) [ 3251.994531] FAULT_INJECTION: forcing a failure. [ 3251.994531] name failslab, interval 1, probability 0, space 0, times 0 [ 3251.996192] CPU: 0 PID: 14683 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3251.996988] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3251.997934] Call Trace: [ 3251.998246] dump_stack+0x107/0x167 [ 3251.998674] should_fail.cold+0x5/0xa [ 3251.999115] should_failslab+0x5/0x20 [ 3251.999551] __kmalloc_track_caller+0x79/0x310 [ 3252.000086] ? sidtab_sid2str_get+0x17e/0x720 [ 3252.000605] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3252.001205] kmemdup+0x23/0x50 [ 3252.001586] sidtab_sid2str_get+0x17e/0x720 [ 3252.002094] sidtab_entry_to_string+0x33/0x110 [ 3252.002638] security_sid_to_context_core+0x33c/0x5d0 [ 3252.003228] selinux_kernfs_init_security+0x239/0x4c0 [ 3252.003818] ? selinux_file_mprotect+0x610/0x610 [ 3252.004356] ? find_held_lock+0x2c/0x110 [ 3252.004825] ? __kernfs_new_node+0x2ad/0x850 [ 3252.005330] ? rwlock_bug.part.0+0x90/0x90 [ 3252.005838] security_kernfs_init_security+0x4e/0xb0 [ 3252.006415] __kernfs_new_node+0x531/0x850 [ 3252.006938] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3252.007483] ? rcu_read_lock_sched_held+0x3e/0x80 [ 3252.008051] ? pcpu_alloc+0x12a/0x1360 [ 3252.008527] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 3252.009144] kernfs_create_dir_ns+0x9c/0x230 [ 3252.009668] cgroup_mkdir+0x318/0xfe0 [ 3252.010119] ? cgroup_destroy_locked+0x710/0x710 [ 3252.010690] kernfs_iop_mkdir+0x14d/0x1e0 [ 3252.011187] vfs_mkdir+0x424/0x680 [ 3252.011612] do_mkdirat+0x145/0x2a0 [ 3252.012048] ? user_path_create+0xf0/0xf0 [ 3252.012523] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3252.013153] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3252.013772] do_syscall_64+0x33/0x40 [ 3252.014222] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3252.014845] RIP: 0033:0x7f4c4e303b19 [ 3252.015281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3252.017449] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3252.018358] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3252.019206] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3252.020044] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3252.020873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3252.021726] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 14:51:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 25) 14:51:06 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = mq_open(&(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x6c, &(0x7f00000000c0)={0x5, 0x5, 0x40, 0x8}) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000280)) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000200)=0x3) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)={[{@subsystem='freezer'}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) 14:51:06 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000854, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000180)="851fe62b713f9e01eac3a9eab068fbdf7c32e3e5e57f73e5de8882f4cc279ba730f13321d54bce88300ce860faf732bf8b396da49025d0a8ef0274adf082e9e8995a236e217426027e1513fc1ac395a55bff8a5101", 0x55}], 0x1, &(0x7f0000000280)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6a}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xc2}}, @ip_ttl={{0x14, 0x0, 0x2, 0xe30f}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}], 0x80}, 0x40) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) recvmmsg(r2, &(0x7f00000019c0)=[{{&(0x7f0000000140)=@isdn, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, &(0x7f0000000280)=""/144, 0x90}, 0x6}, {{&(0x7f0000000340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)=""/179, 0xb3}, {&(0x7f0000000480)=""/66, 0x42}, {&(0x7f0000000500)=""/152, 0x98}, {&(0x7f00000005c0)=""/101, 0x65}, {&(0x7f0000000640)=""/4096, 0x1000}], 0x5, &(0x7f00000016c0)=""/203, 0xcb}, 0x8001}, {{&(0x7f00000017c0)=@can, 0x80, &(0x7f0000001840)}, 0x4}, {{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001880)=""/108, 0x6c}, {&(0x7f0000001900)=""/29, 0x1d}], 0x2, &(0x7f0000001980)=""/10, 0xa}, 0x10001}], 0x4, 0x20, &(0x7f0000001ac0)={0x0, 0x3938700}) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000340)=0x1, 0x4) setsockopt$sock_linger(r0, 0x1, 0x35, &(0x7f0000000000)={0x1}, 0x8) signalfd4(r0, &(0x7f0000000040), 0x8, 0x80000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x10001, 0x0) dup2(r3, r4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r5, 0x0, 0x20d315) [ 3252.146989] FAULT_INJECTION: forcing a failure. [ 3252.146989] name failslab, interval 1, probability 0, space 0, times 0 [ 3252.147035] CPU: 0 PID: 14707 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3252.147041] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3252.147045] Call Trace: [ 3252.147060] dump_stack+0x107/0x167 [ 3252.147075] should_fail.cold+0x5/0xa [ 3252.147092] should_failslab+0x5/0x20 [ 3252.147103] __kmalloc_track_caller+0x79/0x310 [ 3252.147114] ? sidtab_sid2str_get+0x17e/0x720 14:51:07 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 26) [ 3252.147130] kmemdup+0x23/0x50 [ 3252.147145] sidtab_sid2str_get+0x17e/0x720 [ 3252.147162] sidtab_entry_to_string+0x33/0x110 [ 3252.147177] security_sid_to_context_core+0x33c/0x5d0 [ 3252.147194] selinux_kernfs_init_security+0x239/0x4c0 [ 3252.147205] ? selinux_file_mprotect+0x610/0x610 14:51:07 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cec"], 0x130) [ 3252.147215] ? find_held_lock+0x2c/0x110 [ 3252.147231] ? __kernfs_new_node+0x2ad/0x850 14:51:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) execveat(r0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000300), &(0x7f0000000240)=[&(0x7f0000000340)='\x00', &(0x7f0000000280)='$\x11\x98%.+&\x00\xb8\xebAY\x86\x01\xf9+\a\xc2\xfe\x8a6\xab\x15%\fW\xc0\xda\xad\f\xcb\xb7f1\x8eW4\x13\xe9\x8f\xe1\xcb\x03\x9a\x18\xcf\x82\x8eI\xf5\xeei\xf5\x1f8\x05\xb7\x9b\xfbY\x87\xc5xp\x92w\xf6\xc0\xe3\xee\x16\x82\tvP\xa5\x1e?\x04\xe9\xff\x00,\xdf\xc6\x00\x86\t^\xcc\xec$\xb4\xcb\xc0\x9a[)Ug\v\xe8\xf2\xb6d\xd9\xbfQd\xfcnsH\xe53\x1e8\x11\xc3\x9a\xdf\x88a=\x13', &(0x7f0000000440)='|\x00\xcb\xd4Q\xeb\r/\x8a\xcaK\x82v\xde\xc5\x91b\x12J^\xc2E\xef\xe8\xd9\xcb\xab\x95\xe0\xcb\xeb\xb3o\xa4\xf3\xf92\xd6\x16\xeei\x80w\xec\x8c\x1c\x96ez\x1a\xe93G\xe5\x89\xaf\xbc\xd3\xcf\xbc\xcf\xfc\xb4\x1c\x00\xcc\x1e\xf7\xec\t8`7\xab\xd4\r\xf3-q\xb3\xb3\x835`\xc8\x16\a\xee:\x11\'\n\xcb\x1b\xb1$s\x86\n\xb01k\xc8\xea\xf0;\xfa\xe9\xfe\'j\xc1@\x06\x82\x87\x91\x89\xc4o\xcc\xbef\xe5\x84\x95\x85j\xe4`\x80D\xdf*O{7p\xa1!\xd1\xb7\xd62\f<\x80\xed\x8d\xb2\x03\x1a#J\a\xf3!\x849\xaaE\xd8\xad\xeds=\x06x\x94\x83}n\xa6\xf4\xf2\xe8'], 0x100) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) r4 = epoll_create(0x3) fallocate(0xffffffffffffffff, 0x4c, 0x5b, 0x2) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r4, 0x40189429, &(0x7f0000000080)={0x0, 0x3, 0xfffffffffffffeff}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x2000000, 0x3, 0xfffffffffffffffd}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) [ 3252.147247] ? rwlock_bug.part.0+0x90/0x90 [ 3252.147263] security_kernfs_init_security+0x4e/0xb0 [ 3252.147277] __kernfs_new_node+0x531/0x850 [ 3252.147294] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3252.147310] ? rcu_read_lock_sched_held+0x3e/0x80 [ 3252.147320] ? pcpu_alloc+0x12a/0x1360 [ 3252.147336] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 3252.147354] kernfs_create_dir_ns+0x9c/0x230 14:51:07 executing program 7: ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x6, 0x3, 0x7fffffff}) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x80800, 0x0) fallocate(r3, 0x78, 0x9, 0xc000) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000180)) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000080)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000028c0)={'sit0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="040000000000000000000000e681566a7e5467af71e03c1a72876d0a60b4590799c767036546b7"]}) pipe(&(0x7f0000000100)) socket$nl_netfilter(0x10, 0x3, 0xc) unshare(0x48020200) [ 3252.147370] cgroup_mkdir+0x318/0xfe0 [ 3252.147386] ? cgroup_destroy_locked+0x710/0x710 [ 3252.147399] kernfs_iop_mkdir+0x14d/0x1e0 [ 3252.147414] vfs_mkdir+0x424/0x680 [ 3252.147427] do_mkdirat+0x145/0x2a0 [ 3252.147438] ? user_path_create+0xf0/0xf0 [ 3252.147452] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 14:51:07 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 27) [ 3252.147463] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3252.147478] do_syscall_64+0x33/0x40 [ 3252.147490] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3252.147497] RIP: 0033:0x7f4c4e303b19 [ 3252.147508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3252.147513] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3252.147525] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3252.147531] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3252.147537] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3252.147543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3252.147549] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 [ 3252.250762] FAULT_INJECTION: forcing a failure. [ 3252.250762] name failslab, interval 1, probability 0, space 0, times 0 [ 3252.250869] CPU: 0 PID: 14722 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3252.250875] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3252.250879] Call Trace: [ 3252.250893] dump_stack+0x107/0x167 [ 3252.250910] should_fail.cold+0x5/0xa [ 3252.250924] ? __kernfs_iattrs+0xbc/0x470 [ 3252.250937] should_failslab+0x5/0x20 [ 3252.250947] kmem_cache_alloc+0x5b/0x360 [ 3252.250962] __kernfs_iattrs+0xbc/0x470 [ 3252.250975] kernfs_xattr_set+0x2b/0x80 [ 3252.250990] selinux_kernfs_init_security+0x26d/0x4c0 [ 3252.251001] ? selinux_file_mprotect+0x610/0x610 [ 3252.251032] security_kernfs_init_security+0x4e/0xb0 [ 3252.251045] __kernfs_new_node+0x531/0x850 [ 3252.251059] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3252.251076] ? rcu_read_lock_sched_held+0x3e/0x80 [ 3252.251085] ? pcpu_alloc+0x12a/0x1360 [ 3252.251101] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 3252.251118] kernfs_create_dir_ns+0x9c/0x230 [ 3252.251134] cgroup_mkdir+0x318/0xfe0 [ 3252.251149] ? cgroup_destroy_locked+0x710/0x710 [ 3252.251162] kernfs_iop_mkdir+0x14d/0x1e0 [ 3252.251176] vfs_mkdir+0x424/0x680 [ 3252.251189] do_mkdirat+0x145/0x2a0 [ 3252.251201] ? user_path_create+0xf0/0xf0 [ 3252.251215] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3252.251225] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3252.251243] do_syscall_64+0x33/0x40 [ 3252.251255] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3252.251262] RIP: 0033:0x7f4c4e303b19 [ 3252.251273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3252.251278] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3252.251290] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3252.251296] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3252.251302] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3252.251308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3252.251313] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 [ 3252.348191] FAULT_INJECTION: forcing a failure. [ 3252.348191] name failslab, interval 1, probability 0, space 0, times 0 [ 3252.348678] CPU: 0 PID: 14730 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3252.348685] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3252.348688] Call Trace: [ 3252.348703] dump_stack+0x107/0x167 [ 3252.348718] should_fail.cold+0x5/0xa [ 3252.348731] ? create_object.isra.0+0x3a/0xa20 [ 3252.348744] should_failslab+0x5/0x20 [ 3252.348754] kmem_cache_alloc+0x5b/0x360 [ 3252.348764] ? find_held_lock+0x2c/0x110 [ 3252.348778] create_object.isra.0+0x3a/0xa20 [ 3252.348788] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3252.348802] kmem_cache_alloc+0x159/0x360 [ 3252.348819] __kernfs_iattrs+0xbc/0x470 [ 3252.348831] kernfs_xattr_set+0x2b/0x80 [ 3252.348847] selinux_kernfs_init_security+0x26d/0x4c0 [ 3252.348858] ? selinux_file_mprotect+0x610/0x610 [ 3252.348867] ? find_held_lock+0x2c/0x110 [ 3252.348881] ? __kernfs_new_node+0x2ad/0x850 [ 3252.348896] ? rwlock_bug.part.0+0x90/0x90 [ 3252.348913] security_kernfs_init_security+0x4e/0xb0 [ 3252.348925] __kernfs_new_node+0x531/0x850 [ 3252.348940] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3252.348956] ? rcu_read_lock_sched_held+0x3e/0x80 [ 3252.348965] ? pcpu_alloc+0x12a/0x1360 [ 3252.348980] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 3252.348998] kernfs_create_dir_ns+0x9c/0x230 [ 3252.349014] cgroup_mkdir+0x318/0xfe0 [ 3252.349028] ? cgroup_destroy_locked+0x710/0x710 [ 3252.349044] kernfs_iop_mkdir+0x14d/0x1e0 [ 3252.349058] vfs_mkdir+0x424/0x680 [ 3252.349071] do_mkdirat+0x145/0x2a0 [ 3252.349082] ? user_path_create+0xf0/0xf0 [ 3252.349095] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3252.349106] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3252.349121] do_syscall_64+0x33/0x40 [ 3252.349133] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3252.349140] RIP: 0033:0x7f4c4e303b19 [ 3252.349150] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3252.349156] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3252.349168] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3252.349173] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3252.349179] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3252.349185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3252.349191] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 14:51:20 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x1210c3, 0x0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r0, 0x3312, 0xffffffff) ioctl$SNAPSHOT_CREATE_IMAGE(r0, 0x40043311, 0x0) 14:51:20 executing program 6: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) fsopen(&(0x7f0000000080)='cpuset\x00', 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r3, 0x0, 0x0) r4 = dup2(0xffffffffffffffff, r2) fsconfig$FSCONFIG_SET_BINARY(r4, 0x2, &(0x7f0000000140)='cpuset\x00', &(0x7f0000000180)='M', 0x1) read$char_usb(r4, 0x0, 0xfdc7) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f0000000340)) socket$nl_netfilter(0x10, 0x3, 0xc) fstat(0xffffffffffffffff, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000100)=ANY=[], 0x78) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000000080)=""/16, &(0x7f0000000100)=0x10) splice(r6, 0x0, r1, 0x0, 0x7b, 0x8) 14:51:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0xf0b, @remote}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:51:20 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0xd74f, 0x8, 0x0, 0x2}, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000001ac0)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 14:51:20 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008840, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) 14:51:20 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, 0x0) r1 = open$dir(&(0x7f00000011c0)='./file0\x00', 0x404001, 0x1e4) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) r2 = creat(0x0, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) r3 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r3, 0x31e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) perf_event_open(0x0, r4, 0xa, r3, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x123) r5 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x0, 0x0, 0x3008800, &(0x7f00000004c0)=ANY=[@ANYBLOB="6e6f7265636f766572792c626172726965723d3078303030303030303030303030303030302c6e6f6abd75726e636c5f636865636b73756d2c7379737667725345a7f8b4e89b09636172642c6461782c646f6e745f61707072616973652c7065726d697458646972656374696f2c00"]) creat(&(0x7f0000000180)='./file0\x00', 0x8) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f0000000280)={0x279b3dfe, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 14:51:20 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a2649cc55aa09997b19022ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89275c29c7decb81fb950000000040ddb827b44d010c05a5c98e52702b059eac222eecbad64abf414366a40197eedcfb2181ed287fad9c290de202b64349f90652599f5e5502d5904084eb98ef37f66802e57c187ad97551d2037eb89eb8e26cc6127a28b406a5e9949a381bdf78028030bf89fd805a0c9ac7798552125b8581902a347753c1a6272a382ee89fab33af8d2e27ae4ce599e6e84fcf15", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 28) 14:51:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7ddd, @empty, 0x20000}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffa}) openat(0xffffffffffffff9c, 0x0, 0x250040, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x145) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="011000000000000027000000", @ANYRES32, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file1\x00']) syz_io_uring_setup(0x5b8a, &(0x7f0000000280)={0x0, 0x414f, 0x20, 0x3, 0x16e}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000340), &(0x7f0000000200)) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0x0, @remote, 0xf8}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') 14:51:21 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) (fail_nth: 1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) 14:51:21 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x1210c3, 0x0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r0, 0x3312, 0xffffffff) ioctl$SNAPSHOT_CREATE_IMAGE(r0, 0x40043311, 0x0) [ 3266.203240] FAULT_INJECTION: forcing a failure. [ 3266.203240] name failslab, interval 1, probability 0, space 0, times 0 [ 3266.203458] CPU: 1 PID: 14750 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3266.203469] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3266.203475] Call Trace: 14:51:21 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 29) [ 3266.203499] dump_stack+0x107/0x167 [ 3266.203525] should_fail.cold+0x5/0xa [ 3266.203548] ? kvmalloc_node+0x119/0x170 [ 3266.203569] should_failslab+0x5/0x20 [ 3266.203586] __kmalloc_node+0x76/0x350 [ 3266.203607] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3266.203633] kvmalloc_node+0x119/0x170 [ 3266.203655] simple_xattr_alloc+0x43/0xa0 [ 3266.203676] simple_xattr_set+0x75/0x610 [ 3266.203706] kernfs_xattr_set+0x50/0x80 [ 3266.203734] selinux_kernfs_init_security+0x26d/0x4c0 [ 3266.203753] ? selinux_file_mprotect+0x610/0x610 [ 3266.203771] ? find_held_lock+0x2c/0x110 [ 3266.203798] ? __kernfs_new_node+0x2ad/0x850 [ 3266.203825] ? rwlock_bug.part.0+0x90/0x90 [ 3266.203854] security_kernfs_init_security+0x4e/0xb0 [ 3266.203878] __kernfs_new_node+0x531/0x850 [ 3266.203904] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3266.203933] ? rcu_read_lock_sched_held+0x3e/0x80 [ 3266.203949] ? pcpu_alloc+0x12a/0x1360 [ 3266.203976] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 3266.204008] kernfs_create_dir_ns+0x9c/0x230 [ 3266.204037] cgroup_mkdir+0x318/0xfe0 [ 3266.204064] ? cgroup_destroy_locked+0x710/0x710 [ 3266.204087] kernfs_iop_mkdir+0x14d/0x1e0 [ 3266.204113] vfs_mkdir+0x424/0x680 [ 3266.204136] do_mkdirat+0x145/0x2a0 [ 3266.204157] ? user_path_create+0xf0/0xf0 [ 3266.204181] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3266.204198] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3266.204225] do_syscall_64+0x33/0x40 [ 3266.204246] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3266.204259] RIP: 0033:0x7f4c4e303b19 [ 3266.204278] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3266.204288] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3266.204309] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3266.204319] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3266.204330] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3266.204340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3266.204351] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 [ 3266.322812] FAULT_INJECTION: forcing a failure. [ 3266.322812] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3266.356203] CPU: 0 PID: 14766 Comm: syz-executor.7 Not tainted 5.10.175 #1 [ 3266.356213] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3266.356219] Call Trace: [ 3266.356243] dump_stack+0x107/0x167 [ 3266.356269] should_fail.cold+0x5/0xa 14:51:21 executing program 3: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000000c0)=@ceph_nfs_confh={0x10, 0x2, {0x907}}, 0x537e00) [ 3266.356295] _copy_from_user+0x2e/0x1b0 [ 3266.356319] __copy_msghdr_from_user+0x91/0x4b0 [ 3266.356338] ? __ia32_sys_shutdown+0x80/0x80 [ 3266.356365] ? __lock_acquire+0xbb1/0x5b00 [ 3266.356394] sendmsg_copy_msghdr+0xa1/0x160 [ 3266.356412] ? do_recvmmsg+0x6d0/0x6d0 [ 3266.356431] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3266.356452] ? mark_lock+0xf5/0x2df0 [ 3266.356473] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3266.356489] ? __lock_acquire+0x1657/0x5b00 [ 3266.356512] ___sys_sendmsg+0xc6/0x170 [ 3266.356532] ? sendmsg_copy_msghdr+0x160/0x160 [ 3266.356553] ? __fget_files+0x26d/0x4c0 [ 3266.356571] ? lock_downgrade+0x6d0/0x6d0 [ 3266.356597] ? lock_downgrade+0x6d0/0x6d0 14:51:21 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a2649cc55aa09997b19022ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89275c29c7decb81fb950000000040ddb827b44d010c05a5c98e52702b059eac222eecbad64abf414366a40197eedcfb2181ed287fad9c290de202b64349f90652599f5e5502d5904084eb98ef37f66802e57c187ad97551d2037eb89eb8e26cc6127a28b406a5e9949a381bdf78028030bf89fd805a0c9ac7798552125b8581902a347753c1a6272a382ee89fab33af8d2e27ae4ce599e6e84fcf15", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 30) [ 3266.356620] ? __fget_files+0x296/0x4c0 14:51:21 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000000c0)={0x0, 0x4}) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) ioctl$TIOCL_GETSHIFTSTATE(r2, 0x541c, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r3 = creat(0x0, 0x1) perf_event_open(0x0, 0x0, 0x2000, 0xffffffffffffffff, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300), 0x0, 0xfffffffffffffffb}], 0x3008800, &(0x7f00000004c0)={[{@norecovery}, {@barrier_val}, {@nojournal_checksum}, {@sysvgroups}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}, {@discard}, {@dax}], [{@dont_appraise}, {@permit_directio}]}) ioctl$AUTOFS_IOC_CATATONIC(r0, 0x9362, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xfff}) ioctl$BTRFS_IOC_LOGICAL_INO(r3, 0xc0389424, &(0x7f0000000140)={0x3ff, 0x0, '\x00', 0x0, &(0x7f0000000040)}) [ 3266.356649] ? __fget_light+0xea/0x290 [ 3266.356675] __sys_sendmmsg+0x195/0x470 [ 3266.356699] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 3266.356717] ? lock_downgrade+0x6d0/0x6d0 [ 3266.356743] ? ksys_write+0x12d/0x260 [ 3266.356771] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3266.356794] ? wait_for_completion_io+0x270/0x270 14:51:21 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r1, &(0x7f0000002040)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r4, @ANYBLOB="010000000000fddbdf251f0000000800010058000000"], 0x1c}}, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) (fail_nth: 2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x220, r7, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x102, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xf6, 0x5, "125e206fd2eb1bfde0b051c9a3bfaaba7f3827ce6b429ff292f4b57fdbb5d17b879d60e6a34620705d877a37f9252cfc23d7e5809c8c17d2a151191cb8f2d99f738dc8ec5352c4fe86f4a0e6b4d6d00e85f9197ed7a1de898d4e2be760ba2eb647a1847afc9c86725e0a0a8e2e11002a4af9f22dd3fb09823a4d70877013fe74d51d6f1f56e69d7a80eadc1f53b759396092e17c1cc3426ab1537014d1c378d1c22ad9c8fa645640adfe33c01c296968be79194f7975acf4eaa4475f97f811f765c148c72999d39f797da460edf696d9d44bd7c316331e7eeac243ee9b03e3b41067ed6ba57e63a957f9646483a28caae248"}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4}, 0xb86890e692d3e688) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="6c24000000526c38d71096ab0700000000000000095d6548864e83ae1f41cd7e8836b470c5cdc0ed4f64db0900816cf6ee0e2f4bc84461705520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9ff0100a1fe9bec50962cdcd4d858d324c0bc4d91713e4420e6860374189851ee35dacaf06432a56e3f5bac44d79f50689a95011bb56e194ed5faf843481de5146214191db2e0176593602cb70de3461d1324f4cd3f8e971c568cece9"], 0x130) [ 3266.356818] ? rcu_read_lock_any_held+0x75/0xa0 [ 3266.356834] ? vfs_write+0x354/0xa70 14:51:21 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[], 0x54}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f00000000c0)={0x0, 0xff, [0x5, 0x7, 0x6, 0x8]}) fstatfs(r0, &(0x7f00000002c0)=""/141) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000380), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r2, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept(r2, 0x0, &(0x7f0000000100)) recvmmsg(r3, &(0x7f00000019c0)=[{{&(0x7f0000000140)=@isdn, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, &(0x7f0000000280)=""/144, 0x90}, 0x6}, {{&(0x7f0000000340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)=""/179, 0xb3}, {&(0x7f0000000480)=""/66, 0x42}, {&(0x7f0000000500)=""/152, 0x98}, {&(0x7f00000005c0)=""/101, 0x65}, {&(0x7f0000000640)=""/4096, 0x1000}], 0x5, &(0x7f00000016c0)=""/203, 0xcb}, 0x8001}, {{&(0x7f00000017c0)=@can, 0x80, &(0x7f0000001840)}, 0x4}, {{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001880)=""/108, 0x6c}, {&(0x7f0000001900)=""/29, 0x1d}], 0x2, &(0x7f0000001980)=""/10, 0xa}, 0x10001}], 0x4, 0x20, &(0x7f0000001ac0)={0x0, 0x3938700}) fallocate(r3, 0x23, 0x5, 0xcd53) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) [ 3266.356855] ? fput_many+0x2f/0x1a0 [ 3266.356874] ? ksys_write+0x1a9/0x260 [ 3266.356903] __x64_sys_sendmmsg+0x99/0x100 [ 3266.356920] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3266.356940] do_syscall_64+0x33/0x40 [ 3266.356961] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3266.356973] RIP: 0033:0x7f50cc052b19 [ 3266.356991] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3266.357001] RSP: 002b:00007f50c95c8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 3266.357021] RAX: ffffffffffffffda RBX: 00007f50cc165f60 RCX: 00007f50cc052b19 [ 3266.357032] RDX: 0400000000000070 RSI: 0000000020004d00 RDI: 0000000000000003 [ 3266.357042] RBP: 00007f50c95c81d0 R08: 0000000000000000 R09: 0000000000000000 [ 3266.357052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3266.357063] R13: 00007ffc6623e34f R14: 00007f50c95c8300 R15: 0000000000022000 [ 3266.375018] FAULT_INJECTION: forcing a failure. [ 3266.375018] name failslab, interval 1, probability 0, space 0, times 0 [ 3266.375039] CPU: 1 PID: 14771 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3266.375050] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3266.375056] Call Trace: [ 3266.375079] dump_stack+0x107/0x167 [ 3266.375105] should_fail.cold+0x5/0xa [ 3266.375127] ? create_object.isra.0+0x3a/0xa20 [ 3266.375149] should_failslab+0x5/0x20 [ 3266.375172] kmem_cache_alloc+0x5b/0x360 [ 3266.375192] ? lock_downgrade+0x6d0/0x6d0 [ 3266.375216] create_object.isra.0+0x3a/0xa20 [ 3266.375234] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3266.375260] __kmalloc_node+0x1ae/0x350 [ 3266.375291] kvmalloc_node+0x119/0x170 [ 3266.375312] simple_xattr_alloc+0x43/0xa0 [ 3266.375333] simple_xattr_set+0x75/0x610 [ 3266.375363] kernfs_xattr_set+0x50/0x80 [ 3266.375390] selinux_kernfs_init_security+0x26d/0x4c0 [ 3266.375410] ? selinux_file_mprotect+0x610/0x610 [ 3266.375427] ? find_held_lock+0x2c/0x110 [ 3266.375454] ? __kernfs_new_node+0x2ad/0x850 [ 3266.375480] ? rwlock_bug.part.0+0x90/0x90 [ 3266.375510] security_kernfs_init_security+0x4e/0xb0 [ 3266.375533] __kernfs_new_node+0x531/0x850 [ 3266.375560] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3266.375588] ? rcu_read_lock_sched_held+0x3e/0x80 [ 3266.375604] ? pcpu_alloc+0x12a/0x1360 [ 3266.375632] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 3266.375663] kernfs_create_dir_ns+0x9c/0x230 [ 3266.375691] cgroup_mkdir+0x318/0xfe0 [ 3266.375718] ? cgroup_destroy_locked+0x710/0x710 [ 3266.375742] kernfs_iop_mkdir+0x14d/0x1e0 [ 3266.375768] vfs_mkdir+0x424/0x680 [ 3266.375790] do_mkdirat+0x145/0x2a0 [ 3266.375811] ? user_path_create+0xf0/0xf0 [ 3266.375835] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3266.375855] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3266.375881] do_syscall_64+0x33/0x40 [ 3266.375902] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3266.375915] RIP: 0033:0x7f4c4e303b19 [ 3266.375934] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3266.375944] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 3266.375965] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3266.375976] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3266.375986] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3266.375996] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3266.376007] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 [ 3266.604843] FAULT_INJECTION: forcing a failure. [ 3266.604843] name failslab, interval 1, probability 0, space 0, times 0 [ 3266.604895] CPU: 1 PID: 14782 Comm: syz-executor.7 Not tainted 5.10.175 #1 [ 3266.604905] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3266.604911] Call Trace: [ 3266.604934] dump_stack+0x107/0x167 [ 3266.604961] should_fail.cold+0x5/0xa [ 3266.604981] ? __alloc_skb+0x6d/0x5b0 [ 3266.605002] should_failslab+0x5/0x20 [ 3266.605020] kmem_cache_alloc_node+0x55/0x380 [ 3266.605043] __alloc_skb+0x6d/0x5b0 [ 3266.605066] alloc_skb_with_frags+0x92/0x570 [ 3266.605088] ? find_held_lock+0x2c/0x110 [ 3266.605114] sock_alloc_send_pskb+0x7af/0x930 [ 3266.605148] ? sk_alloc+0x350/0x350 [ 3266.605175] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3266.605195] ? lock_chain_count+0x20/0x20 [ 3266.605210] ? lock_chain_count+0x20/0x20 [ 3266.605239] __ip6_append_data.isra.0+0x1c12/0x3a70 [ 3266.605271] ? ip6_mtu+0x1bb/0x3d0 [ 3266.605290] ? lock_downgrade+0x6d0/0x6d0 [ 3266.605305] ? ip_frag_init+0x350/0x350 [ 3266.605337] ? ip6_finish_output2+0x1fe0/0x1fe0 [ 3266.605357] ? ip6_mtu+0x1e9/0x3d0 [ 3266.605377] ? ip6_setup_cork+0xfb7/0x1740 [ 3266.605402] ip6_make_skb+0x2de/0x4e0 [ 3266.605418] ? ip_frag_init+0x350/0x350 [ 3266.605445] ? ip_frag_init+0x350/0x350 [ 3266.605472] ? ip6_push_pending_frames+0xf0/0xf0 [ 3266.605500] ? ip6_dst_hoplimit+0x199/0x440 [ 3266.605520] ? lock_downgrade+0x6d0/0x6d0 [ 3266.605563] udpv6_sendmsg+0x2060/0x2a00 [ 3266.605588] ? ip_frag_init+0x350/0x350 [ 3266.605623] ? udp_v6_push_pending_frames+0x360/0x360 [ 3266.605643] ? _down_write_nest_lock+0x160/0x160 [ 3266.605667] ? vmacache_update+0xce/0x140 [ 3266.605695] ? do_user_addr_fault+0x5b0/0xc60 [ 3266.605720] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3266.605754] ? asm_exc_page_fault+0x1e/0x30 [ 3266.605778] ? sock_has_perm+0x1ea/0x280 [ 3266.605826] ? __import_iovec+0x458/0x590 [ 3266.628050] ? udp_v6_push_pending_frames+0x360/0x360 [ 3266.628074] inet6_sendmsg+0x105/0x140 [ 3266.628093] ? inet6_compat_ioctl+0x320/0x320 [ 3266.628115] sock_sendmsg+0xf2/0x190 [ 3266.628134] ____sys_sendmsg+0x334/0x870 [ 3266.628154] ? kernel_sendmsg+0x50/0x50 [ 3266.628169] ? do_recvmmsg+0x6d0/0x6d0 14:51:21 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[], 0x54}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f00000000c0)={0x0, 0xff, [0x5, 0x7, 0x6, 0x8]}) fstatfs(r0, &(0x7f00000002c0)=""/141) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000380), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r2, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept(r2, 0x0, &(0x7f0000000100)) recvmmsg(r3, &(0x7f00000019c0)=[{{&(0x7f0000000140)=@isdn, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)}], 0x1, &(0x7f0000000280)=""/144, 0x90}, 0x6}, {{&(0x7f0000000340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)=""/179, 0xb3}, {&(0x7f0000000480)=""/66, 0x42}, {&(0x7f0000000500)=""/152, 0x98}, {&(0x7f00000005c0)=""/101, 0x65}, {&(0x7f0000000640)=""/4096, 0x1000}], 0x5, &(0x7f00000016c0)=""/203, 0xcb}, 0x8001}, {{&(0x7f00000017c0)=@can, 0x80, &(0x7f0000001840)}, 0x4}, {{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001880)=""/108, 0x6c}, {&(0x7f0000001900)=""/29, 0x1d}], 0x2, &(0x7f0000001980)=""/10, 0xa}, 0x10001}], 0x4, 0x20, &(0x7f0000001ac0)={0x0, 0x3938700}) fallocate(r3, 0x23, 0x5, 0xcd53) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) [ 3266.702883] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3266.702904] ? mark_lock+0xf5/0x2df0 [ 3266.702926] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3266.702942] ? __lock_acquire+0x1657/0x5b00 [ 3266.702965] ___sys_sendmsg+0xf3/0x170 [ 3266.702985] ? sendmsg_copy_msghdr+0x160/0x160 [ 3266.703006] ? __fget_files+0x26d/0x4c0 [ 3266.703024] ? lock_downgrade+0x6d0/0x6d0 [ 3266.703051] ? lock_downgrade+0x6d0/0x6d0 [ 3266.703074] ? __fget_files+0x296/0x4c0 [ 3266.703103] ? __fget_light+0xea/0x290 [ 3266.703130] __sys_sendmmsg+0x195/0x470 [ 3266.703154] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 3266.703172] ? lock_downgrade+0x6d0/0x6d0 [ 3266.703210] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3266.703232] ? wait_for_completion_io+0x270/0x270 [ 3266.703253] ? rcu_read_lock_any_held+0x75/0xa0 [ 3266.703270] ? vfs_write+0x354/0xa70 [ 3266.703291] ? fput_many+0x2f/0x1a0 [ 3266.703310] ? ksys_write+0x1a9/0x260 [ 3266.703339] __x64_sys_sendmmsg+0x99/0x100 [ 3266.703356] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3266.703376] do_syscall_64+0x33/0x40 [ 3266.703396] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3266.703408] RIP: 0033:0x7f50cc052b19 [ 3266.703426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3266.703436] RSP: 002b:00007f50c95c8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 3266.703456] RAX: ffffffffffffffda RBX: 00007f50cc165f60 RCX: 00007f50cc052b19 [ 3266.703467] RDX: 0400000000000070 RSI: 0000000020004d00 RDI: 0000000000000003 [ 3266.703477] RBP: 00007f50c95c81d0 R08: 0000000000000000 R09: 0000000000000000 [ 3266.703487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3266.703497] R13: 00007ffc6623e34f R14: 00007f50c95c8300 R15: 0000000000022000 [ 3266.741702] FAULT_INJECTION: forcing a failure. [ 3266.741702] name failslab, interval 1, probability 0, space 0, times 0 [ 3266.741723] CPU: 1 PID: 14781 Comm: syz-executor.2 Not tainted 5.10.175 #1 [ 3266.741733] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3266.741739] Call Trace: [ 3266.741758] dump_stack+0x107/0x167 [ 3266.741782] should_fail.cold+0x5/0xa [ 3266.741801] ? create_object.isra.0+0x3a/0xa20 [ 3266.741822] should_failslab+0x5/0x20 [ 3266.741840] kmem_cache_alloc+0x5b/0x360 [ 3266.741858] ? lock_downgrade+0x6d0/0x6d0 [ 3266.741881] create_object.isra.0+0x3a/0xa20 [ 3266.741900] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3266.741925] __kmalloc_node+0x1ae/0x350 [ 3266.741955] kvmalloc_node+0x119/0x170 [ 3266.741976] simple_xattr_alloc+0x43/0xa0 [ 3266.741996] simple_xattr_set+0x75/0x610 [ 3266.742027] kernfs_xattr_set+0x50/0x80 [ 3266.742053] selinux_kernfs_init_security+0x26d/0x4c0 [ 3266.742072] ? selinux_file_mprotect+0x610/0x610 [ 3266.742088] ? find_held_lock+0x2c/0x110 [ 3266.742115] ? __kernfs_new_node+0x2ad/0x850 [ 3266.742146] ? rwlock_bug.part.0+0x90/0x90 [ 3266.742175] security_kernfs_init_security+0x4e/0xb0 [ 3266.742198] __kernfs_new_node+0x531/0x850 [ 3266.742225] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 3266.742252] ? rcu_read_lock_sched_held+0x3e/0x80 [ 3266.742268] ? pcpu_alloc+0x12a/0x1360 [ 3266.742295] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 3266.742327] kernfs_create_dir_ns+0x9c/0x230 [ 3266.742354] cgroup_mkdir+0x318/0xfe0 [ 3266.742381] ? cgroup_destroy_locked+0x710/0x710 [ 3266.742405] kernfs_iop_mkdir+0x14d/0x1e0 [ 3266.742429] vfs_mkdir+0x424/0x680 [ 3266.742452] do_mkdirat+0x145/0x2a0 [ 3266.742472] ? user_path_create+0xf0/0xf0 [ 3266.742496] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3266.742514] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3266.742540] do_syscall_64+0x33/0x40 [ 3266.742560] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3266.742572] RIP: 0033:0x7f4c4e303b19 [ 3266.742591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3266.742609] RSP: 002b:00007f4c4b879188 EFLAGS: 00000246 [ 3266.782250] ORIG_RAX: 0000000000000102 [ 3266.782263] RAX: ffffffffffffffda RBX: 00007f4c4e416f60 RCX: 00007f4c4e303b19 [ 3266.782273] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000007 [ 3266.782284] RBP: 00007f4c4b8791d0 R08: 0000000000000000 R09: 0000000000000000 [ 3266.782294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3266.782305] R13: 00007ffc4982a8bf R14: 00007f4c4b879300 R15: 0000000000022000 [ 3280.478346] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88801a4cb000 (size 144): comm "syz-executor.2", pid 14750, jiffies 4297933103 (age 22.828s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 69 c4 19 64 00 00 00 00 ........i..d.... 21 10 ee 03 00 00 00 00 69 c4 19 64 00 00 00 00 !.......i..d.... backtrace: [<00000000b6fa0005>] __kernfs_iattrs+0xbc/0x470 [<0000000042f5ee66>] kernfs_xattr_set+0x2b/0x80 [<000000006103c4fe>] selinux_kernfs_init_security+0x26d/0x4c0 [<000000007cd00cb4>] security_kernfs_init_security+0x4e/0xb0 [<000000009f101914>] __kernfs_new_node+0x531/0x850 [<00000000e0f882d4>] kernfs_create_dir_ns+0x9c/0x230 [<000000009be9fae3>] cgroup_mkdir+0x318/0xfe0 [<00000000b95c6609>] kernfs_iop_mkdir+0x14d/0x1e0 [<00000000df4a175b>] vfs_mkdir+0x424/0x680 [<00000000362b16d8>] do_mkdirat+0x145/0x2a0 [<00000000ce2ad9f2>] do_syscall_64+0x33/0x40 [<0000000055aa6351>] entry_SYSCALL_64_after_hwframe+0x61/0xc6 BUG: leak checking failed VM DIAGNOSIS: 14:51:44 Registers: info registers vcpu 0 RAX=0000085d7627acd0 RBX=0000000000000000 RCX=00000000000006e0 RDX=000000000000085d RSI=ffff88806ce27980 RDI=0000000000053417 RBP=ffff88806ce27980 RSP=ffff88806ce09ec8 R8 =0000000000000000 R9 =0000000000000000 R10=0000000000000000 R11=0000000000000001 R12=0000000000053417 R13=0000000000000000 R14=ffff88806ce2eaf8 R15=0000000000000000 RIP=ffffffff810e0891 RFL=00000012 [----A--] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fa518858f50 CR3=000000001b0c6000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=656a626f206465636e6572656665726e XMM02=2934343120657a697328203030306263 XMM03=3120646970202c22322e726f74756365 XMM04=2e2e2e2e2e2e2e202030302030302030 XMM05=20303020303020303020303020303020 XMM06=65747962203233207473726966282070 XMM07=32322065676128203330313333393739 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e75630 RBX=ffff888008970000 RCX=ffffffff83e5d42c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e759f3 RBP=ffffed100112e000 RSP=ffff88800897fe78 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85672888 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e7563e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fff770d3170 CR3=000000000ca78000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=000000000000000041450b1c00000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000