fffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 18:59:54 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(0x0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 18:59:54 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000000)="4bcc1914b4615a938a1c48a077898a94e0d89ea369ad9ed3294453ce763cbd77fb724269110c65fb9cae075bdcf8a54bcc1ee6928b5311f31cd2f84c68f6f154ff6ed9637b535f6c938ba683610393723958d8c5103d1bbd34e24b3a45ad3755bcac99e9925f71614b52d041eada0cac12d571dd12a058f374a929b27aa3e1bef9c307a51eea78e057b80a7db8039f62a2e12d", 0x93}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729", 0x1d}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x4, 0x17, 0x0) 18:59:54 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000280)={0x14}) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) [ 1030.586598] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 19:00:09 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:00:09 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/cgroup.procs\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:00:09 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:00:09 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r0, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(0xffffffffffffffff, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:00:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000280)={0x14}) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) 19:00:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000000)="4bcc1914b4615a938a1c48a077898a94e0d89ea369ad9ed3294453ce763cbd77fb724269110c65fb9cae075bdcf8a54bcc1ee6928b5311f31cd2f84c68f6f154ff6ed9637b535f6c938ba683610393723958d8c5103d1bbd34e24b3a45ad3755bcac99e9925f71614b52d041eada0cac12d571dd12a058f374a929b27aa3e1bef9c307a51eea78e057b80a7db8039f62a2e12d", 0x93}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729", 0x1d}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x4, 0x17, 0x0) 19:00:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000280)={0x14}) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) 19:00:09 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x3, 0x20, 0x3, 0x3, 0x0, 0x7fff, 0x420, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x81, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x8000, 0x9, 0x0, 0x5, 0x5, 0xfff, 0x6, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0xa8c5112277568187) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:00:09 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r0, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(0xffffffffffffffff, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:00:09 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/cgroup.procs\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:00:09 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:00:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000280)={0x14}) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) 19:00:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000280)={0x14}) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) 19:00:09 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:00:09 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/cgroup.procs\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:00:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000000)="4bcc1914b4615a938a1c48a077898a94e0d89ea369ad9ed3294453ce763cbd77fb724269110c65fb9cae075bdcf8a54bcc1ee6928b5311f31cd2f84c68f6f154ff6ed9637b535f6c938ba683610393723958d8c5103d1bbd34e24b3a45ad3755bcac99e9925f71614b52d041eada0cac12d571dd12a058f374a929b27aa3e1bef9c307a51eea78e057b80a7db8039f62a2e12d", 0x93}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb96479851", 0x22}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x4, 0x17, 0x0) 19:00:23 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:00:23 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:00:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000000)="4bcc1914b4615a938a1c48a077898a94e0d89ea369ad9ed3294453ce763cbd77fb724269110c65fb9cae075bdcf8a54bcc1ee6928b5311f31cd2f84c68f6f154ff6ed9637b535f6c938ba683610393723958d8c5103d1bbd34e24b3a45ad3755bcac99e9925f71614b52d041eada0cac12d571dd12a058f374a929b27aa3e1bef9c307a51eea78e057b80a7db8039f62a2e12d", 0x93}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb96479851", 0x22}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x4, 0x17, 0x0) 19:00:23 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:00:23 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:00:23 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r0, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(0xffffffffffffffff, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:00:23 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000280)={0x14}) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) 19:00:23 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:00:23 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:00:23 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:00:23 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000280)={0x14}) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) 19:00:23 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:00:23 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:00:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000000)="4bcc1914b4615a938a1c48a077898a94e0d89ea369ad9ed3294453ce763cbd77fb724269110c65fb9cae075bdcf8a54bcc1ee6928b5311f31cd2f84c68f6f154ff6ed9637b535f6c938ba683610393723958d8c5103d1bbd34e24b3a45ad3755bcac99e9925f71614b52d041eada0cac12d571dd12a058f374a929b27aa3e1bef9c307a51eea78e057b80a7db8039f62a2e12d", 0x93}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb96479851", 0x22}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x4, 0x17, 0x0) 19:00:24 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:00:24 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:00:38 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:00:38 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:00:38 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:00:38 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:00:38 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:00:38 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:00:38 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000000)="4bcc1914b4615a938a1c48a077898a94e0d89ea369ad9ed3294453ce763cbd77fb724269110c65fb9cae075bdcf8a54bcc1ee6928b5311f31cd2f84c68f6f154ff6ed9637b535f6c938ba683610393723958d8c5103d1bbd34e24b3a45ad3755bcac99e9925f71614b52d041eada0cac12d571dd12a058f374a929b27aa3e1bef9c307a51eea78e057b80a7db8039f62a2e12d", 0x93}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f42", 0x24}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x4, 0x17, 0x0) 19:00:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:00:38 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000280)={0x14}) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) 19:00:38 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:00:38 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:00:38 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:00:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) [ 1075.136321] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (11 blocks) 19:00:38 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000280)={0x14}) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) 19:00:38 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000000)="4bcc1914b4615a938a1c48a077898a94e0d89ea369ad9ed3294453ce763cbd77fb724269110c65fb9cae075bdcf8a54bcc1ee6928b5311f31cd2f84c68f6f154ff6ed9637b535f6c938ba683610393723958d8c5103d1bbd34e24b3a45ad3755bcac99e9925f71614b52d041eada0cac12d571dd12a058f374a929b27aa3e1bef9c307a51eea78e057b80a7db8039f62a2e12d", 0x93}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f42", 0x24}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x4, 0x17, 0x0) 19:00:53 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:00:53 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:00:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:00:53 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:00:53 executing program 4: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(0x0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:00:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000280)={0x14}) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) 19:00:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000000)="4bcc1914b4615a938a1c48a077898a94e0d89ea369ad9ed3294453ce763cbd77fb724269110c65fb9cae075bdcf8a54bcc1ee6928b5311f31cd2f84c68f6f154ff6ed9637b535f6c938ba683610393723958d8c5103d1bbd34e24b3a45ad3755bcac99e9925f71614b52d041eada0cac12d571dd12a058f374a929b27aa3e1bef9c307a51eea78e057b80a7db8039f62a2e12d", 0x93}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f42", 0x24}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x4, 0x17, 0x0) 19:00:53 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000f256bcd97d4240ebf0300a003ec517b121b66ceaf65946de73018975a28a3770f47c701d70504000000000000006b86cfba5e16d772d269221414b9da9406ad12e2e4717e7103e052a894962ae411ca375d3c2549f4fb0d5654fc9e641f5dd20803928b69bd2138eb5d09fabdc96bc3cb22ad151e1ee50a0c03b4c1688e830a1d552f5590a74a6699f38857a60f94f8a36f1a8a7da7a6d6b174e55a559ebf302fa04f7096fbd8f401ba8c78978d97cd20f63b6d348978bca796f852b942873fab9777682e5e914b6c9eaf345dc93178f3f2dd287b89820000000000000000000000ec00001c9e746babb574b1fa04abe51dd4000320ee5c3b4c871dd965c387dd3ab0c12e7af8ce58c8a277f3acd07a96195163b040e7ef0ed30ab6abeaebb9086af9d225f218f31179e4b984391e7538b4ee3c886f3ff0581f8ce0ce3bfff615000000000000000000"]) [ 1090.424586] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (11 blocks) 19:00:53 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:00:54 executing program 4: r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) 19:00:54 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000f256bcd97d4240ebf0300a003ec517b121b66ceaf65946de73018975a28a3770f47c701d70504000000000000006b86cfba5e16d772d269221414b9da9406ad12e2e4717e7103e052a894962ae411ca375d3c2549f4fb0d5654fc9e641f5dd20803928b69bd2138eb5d09fabdc96bc3cb22ad151e1ee50a0c03b4c1688e830a1d552f5590a74a6699f38857a60f94f8a36f1a8a7da7a6d6b174e55a559ebf302fa04f7096fbd8f401ba8c78978d97cd20f63b6d348978bca796f852b942873fab9777682e5e914b6c9eaf345dc93178f3f2dd287b89820000000000000000000000ec00001c9e746babb574b1fa04abe51dd4000320ee5c3b4c871dd965c387dd3ab0c12e7af8ce58c8a277f3acd07a96195163b040e7ef0ed30ab6abeaebb9086af9d225f218f31179e4b984391e7538b4ee3c886f3ff0581f8ce0ce3bfff615000000000000000000"]) 19:00:54 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, 0x0, 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:00:54 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:00:54 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000000)="4bcc1914b4615a938a1c48a077898a94e0d89ea369ad9ed3294453ce763cbd77fb724269110c65fb9cae075bdcf8a54bcc1ee6928b5311f31cd2f84c68f6f154ff6ed9637b535f6c938ba683610393723958d8c5103d1bbd34e24b3a45ad3755bcac99e9925f71614b52d041eada0cac12d571dd12a058f374a929b27aa3e1bef9c307a51eea78e057b80a7db8039f62a2e12d", 0x93}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271", 0x25}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x4, 0x17, 0x0) [ 1090.684563] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (11 blocks) [ 1090.752749] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:00:54 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) [ 1090.822554] EXT4-fs error (device loop4): __ext4_new_inode:1068: comm syz-executor.4: reserved inode found cleared - inode=1 19:01:10 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:01:10 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:01:10 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:01:10 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:01:10 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000000)="4bcc1914b4615a938a1c48a077898a94e0d89ea369ad9ed3294453ce763cbd77fb724269110c65fb9cae075bdcf8a54bcc1ee6928b5311f31cd2f84c68f6f154ff6ed9637b535f6c938ba683610393723958d8c5103d1bbd34e24b3a45ad3755bcac99e9925f71614b52d041eada0cac12d571dd12a058f374a929b27aa3e1bef9c307a51eea78e057b80a7db8039f62a2e12d", 0x93}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271", 0x25}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x4, 0x17, 0x0) 19:01:10 executing program 4: r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) 19:01:10 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:01:10 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, 0x0, 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) [ 1106.716249] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1106.752163] EXT4-fs error (device loop4): __ext4_new_inode:1068: comm syz-executor.4: reserved inode found cleared - inode=1 19:01:10 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:01:10 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:01:10 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, 0x0, 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:01:10 executing program 4: r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) 19:01:10 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(0x0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:01:10 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:01:10 executing program 3: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:01:10 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000000)="4bcc1914b4615a938a1c48a077898a94e0d89ea369ad9ed3294453ce763cbd77fb724269110c65fb9cae075bdcf8a54bcc1ee6928b5311f31cd2f84c68f6f154ff6ed9637b535f6c938ba683610393723958d8c5103d1bbd34e24b3a45ad3755bcac99e9925f71614b52d041eada0cac12d571dd12a058f374a929b27aa3e1bef9c307a51eea78e057b80a7db8039f62a2e12d", 0x93}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271", 0x25}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x4, 0x17, 0x0) [ 1107.194560] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1107.288626] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1107.296784] EXT4-fs (loop2): get root inode failed [ 1107.298030] EXT4-fs (loop2): mount failed 19:01:24 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(0x0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:01:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, 0x0, 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:01:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:01:24 executing program 3: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:01:24 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:01:24 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:01:24 executing program 7: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:01:24 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:01:24 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {0x0}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) [ 1121.337014] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1121.339615] EXT4-fs (loop2): get root inode failed [ 1121.340214] EXT4-fs (loop2): mount failed 19:01:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:01:24 executing program 3: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:01:24 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(0x0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:01:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, 0x0, 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:01:24 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) [ 1121.562486] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1121.583292] EXT4-fs (loop2): get root inode failed [ 1121.584625] EXT4-fs (loop2): mount failed 19:01:25 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:01:25 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:01:39 executing program 7: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:01:39 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:01:39 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:01:39 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {0x0, 0x0, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:01:39 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:01:39 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {0x0}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:01:39 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:01:39 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) [ 1135.671918] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1135.673970] EXT4-fs (loop2): get root inode failed [ 1135.674582] EXT4-fs (loop2): mount failed 19:01:39 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:01:39 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:01:39 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {0x0}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:01:39 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:01:39 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:01:39 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {0x0, 0x0, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) [ 1135.876454] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1135.878093] EXT4-fs (loop2): get root inode failed [ 1135.878621] EXT4-fs (loop2): mount failed 19:01:39 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {0x0, 0x0, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000f256bcd97d4240ebf0300a003ec517b121b66ceaf65946de73018975a28a3770f47c701d70504000000000000006b86cfba5e16d772d269221414b9da9406ad12e2e4717e7103e052a894962ae411ca375d3c2549f4fb0d5654fc9e641f5dd20803928b69bd2138eb5d09fabdc96bc3cb22ad151e1ee50a0c03b4c1688e830a1d552f5590a74a6699f38857a60f94f8a36f1a8a7da7a6d6b174e55a559ebf302fa04f7096fbd8f401ba8c78978d97cd20f63b6d348978bca796f852b942873fab9777682e5e914b6c9eaf345dc93178f3f2dd287b89820000000000000000000000ec00001c9e746babb574b1fa04abe51dd4000320ee5c3b4c871dd965c387dd3ab0c12e7af8ce58c8a277f3acd07a96195163b040e7ef0ed30ab6abeaebb9086af9d225f218f31179e4b984391e7538b4ee3c886f3ff0581f8ce0ce3bfff615000000000000000000"]) 19:01:39 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) [ 1135.998575] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1136.000519] EXT4-fs (loop2): get root inode failed [ 1136.001154] EXT4-fs (loop2): mount failed 19:01:54 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:01:54 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:01:54 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00), 0x0, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:01:54 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000140)}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:01:54 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:01:54 executing program 7: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:01:54 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:01:54 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 1151.296361] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1151.302282] EXT4-fs (loop2): get root inode failed [ 1151.303556] EXT4-fs (loop2): mount failed 19:01:54 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00), 0x0, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:01:54 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:01:55 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:01:55 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:01:55 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 1151.577188] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1151.580522] EXT4-fs (loop2): get root inode failed [ 1151.581897] EXT4-fs (loop2): mount failed 19:01:55 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:01:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000140)}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:01:55 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00), 0x0, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000f256bcd97d4240ebf0300a003ec517b121b66ceaf65946de73018975a28a3770f47c701d70504000000000000006b86cfba5e16d772d269221414b9da9406ad12e2e4717e7103e052a894962ae411ca375d3c2549f4fb0d5654fc9e641f5dd20803928b69bd2138eb5d09fabdc96bc3cb22ad151e1ee50a0c03b4c1688e830a1d552f5590a74a6699f38857a60f94f8a36f1a8a7da7a6d6b174e55a559ebf302fa04f7096fbd8f401ba8c78978d97cd20f63b6d348978bca796f852b942873fab9777682e5e914b6c9eaf345dc93178f3f2dd287b89820000000000000000000000ec00001c9e746babb574b1fa04abe51dd4000320ee5c3b4c871dd965c387dd3ab0c12e7af8ce58c8a277f3acd07a96195163b040e7ef0ed30ab6abeaebb9086af9d225f218f31179e4b984391e7538b4ee3c886f3ff0581f8ce0ce3bfff615000000000000000000"]) [ 1152.025424] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1152.028347] EXT4-fs (loop2): get root inode failed [ 1152.029433] EXT4-fs (loop2): mount failed 19:02:08 executing program 6: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:02:08 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:02:08 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:02:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:02:08 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, 0x0, 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:02:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:02:08 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000140)}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:02:08 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f465", 0xf, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) [ 1165.405531] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated 19:02:08 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) [ 1165.419765] EXT4-fs (loop2): get root inode failed [ 1165.421073] EXT4-fs (loop2): mount failed 19:02:08 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:02:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:02:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:02:09 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f465", 0xf, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000f256bcd97d4240ebf0300a003ec517b121b66ceaf65946de73018975a28a3770f47c701d70504000000000000006b86cfba5e16d772d269221414b9da9406ad12e2e4717e7103e052a894962ae411ca375d3c2549f4fb0d5654fc9e641f5dd20803928b69bd2138eb5d09fabdc96bc3cb22ad151e1ee50a0c03b4c1688e830a1d552f5590a74a6699f38857a60f94f8a36f1a8a7da7a6d6b174e55a559ebf302fa04f7096fbd8f401ba8c78978d97cd20f63b6d348978bca796f852b942873fab9777682e5e914b6c9eaf345dc93178f3f2dd287b89820000000000000000000000ec00001c9e746babb574b1fa04abe51dd4000320ee5c3b4c871dd965c387dd3ab0c12e7af8ce58c8a277f3acd07a96195163b040e7ef0ed30ab6abeaebb9086af9d225f218f31179e4b984391e7538b4ee3c886f3ff0581f8ce0ce3bfff615000000000000000000"]) 19:02:09 executing program 4: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:02:09 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) [ 1165.735072] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1165.750391] EXT4-fs (loop2): get root inode failed [ 1165.751587] EXT4-fs (loop2): mount failed 19:02:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:02:21 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f465", 0xf, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:02:21 executing program 6: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:02:21 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:02:21 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:02:21 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae441", 0x13}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:02:21 executing program 4: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:02:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:02:21 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) [ 1178.572361] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1178.590246] EXT4-fs (loop2): get root inode failed [ 1178.591649] EXT4-fs (loop2): mount failed 19:02:22 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:02:22 executing program 4: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:02:22 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:02:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:02:22 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000", 0x16, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:02:22 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:02:22 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) [ 1178.958484] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1178.964253] EXT4-fs (loop2): get root inode failed [ 1178.965496] EXT4-fs (loop2): mount failed 19:02:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae441", 0x13}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:02:22 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:02:35 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000", 0x16, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:02:35 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:02:35 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae441", 0x13}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:02:35 executing program 6: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:02:35 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, 0x0, 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:02:35 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:02:35 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:02:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) [ 1192.207412] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1192.222670] EXT4-fs (loop2): get root inode failed [ 1192.223752] EXT4-fs (loop2): mount failed 19:02:35 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:02:35 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:02:35 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000", 0x16, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:02:35 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, 0x0, 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:02:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) [ 1192.548056] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1192.564022] EXT4-fs (loop2): get root inode failed [ 1192.565110] EXT4-fs (loop2): mount failed 19:02:36 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729", 0x1d}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:02:36 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:02:36 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:02:36 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000", 0x1a, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000f256bcd97d4240ebf0300a003ec517b121b66ceaf65946de73018975a28a3770f47c701d70504000000000000006b86cfba5e16d772d269221414b9da9406ad12e2e4717e7103e052a894962ae411ca375d3c2549f4fb0d5654fc9e641f5dd20803928b69bd2138eb5d09fabdc96bc3cb22ad151e1ee50a0c03b4c1688e830a1d552f5590a74a6699f38857a60f94f8a36f1a8a7da7a6d6b174e55a559ebf302fa04f7096fbd8f401ba8c78978d97cd20f63b6d348978bca796f852b942873fab9777682e5e914b6c9eaf345dc93178f3f2dd287b89820000000000000000000000ec00001c9e746babb574b1fa04abe51dd4000320ee5c3b4c871dd965c387dd3ab0c12e7af8ce58c8a277f3acd07a96195163b040e7ef0ed30ab6abeaebb9086af9d225f218f31179e4b984391e7538b4ee3c886f3ff0581f8ce0ce3bfff615000000000000000000"]) 19:02:36 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) [ 1192.896536] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1192.902372] EXT4-fs (loop2): get root inode failed [ 1192.903277] EXT4-fs (loop2): mount failed 19:02:51 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:02:51 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:02:51 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:02:51 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:02:51 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:02:51 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000", 0x1a, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:02:51 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729", 0x1d}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:02:51 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, 0x0, 0x0) [ 1208.302762] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1208.311852] EXT4-fs (loop2): get root inode failed [ 1208.312395] EXT4-fs (loop2): mount failed 19:02:51 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:02:51 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, 0x0, 0x0) 19:02:51 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000", 0x1a, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:02:51 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:02:51 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000280)={0x14}) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) 19:02:52 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729", 0x1d}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) [ 1208.583120] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1208.584771] EXT4-fs (loop2): get root inode failed [ 1208.585477] EXT4-fs (loop2): mount failed 19:02:52 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:03:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:03:06 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, 0x0, 0x0) 19:03:06 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:03:06 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:03:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000280)={0x14}) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) 19:03:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb96479851", 0x22}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:03:06 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:03:06 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000000400", 0x1c, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) [ 1222.623923] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 1222.629230] EXT4-fs (loop2): mount failed 19:03:06 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:03:06 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:03:06 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000000400", 0x1c, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:03:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:03:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000280)={0x14}) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) 19:03:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb96479851", 0x22}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:03:06 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) [ 1223.046344] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 1223.047710] EXT4-fs (loop2): mount failed 19:03:06 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:03:21 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:03:21 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000000400", 0x1c, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000f256bcd97d4240ebf0300a003ec517b121b66ceaf65946de73018975a28a3770f47c701d70504000000000000006b86cfba5e16d772d269221414b9da9406ad12e2e4717e7103e052a894962ae411ca375d3c2549f4fb0d5654fc9e641f5dd20803928b69bd2138eb5d09fabdc96bc3cb22ad151e1ee50a0c03b4c1688e830a1d552f5590a74a6699f38857a60f94f8a36f1a8a7da7a6d6b174e55a559ebf302fa04f7096fbd8f401ba8c78978d97cd20f63b6d348978bca796f852b942873fab9777682e5e914b6c9eaf345dc93178f3f2dd287b89820000000000000000000000ec00001c9e746babb574b1fa04abe51dd4000320ee5c3b4c871dd965c387dd3ab0c12e7af8ce58c8a277f3acd07a96195163b040e7ef0ed30ab6abeaebb9086af9d225f218f31179e4b984391e7538b4ee3c886f3ff0581f8ce0ce3bfff615000000000000000000"]) 19:03:21 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:03:21 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:03:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:03:21 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb96479851", 0x22}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:03:21 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:03:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) [ 1238.269464] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 1238.270147] EXT4-fs (loop2): mount failed 19:03:21 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000f256bcd97d4240ebf0300a003ec517b121b66ceaf65946de73018975a28a3770f47c701d70504000000000000006b86cfba5e16d772d269221414b9da9406ad12e2e4717e7103e052a894962ae411ca375d3c2549f4fb0d5654fc9e641f5dd20803928b69bd2138eb5d09fabdc96bc3cb22ad151e1ee50a0c03b4c1688e830a1d552f5590a74a6699f38857a60f94f8a36f1a8a7da7a6d6b174e55a559ebf302fa04f7096fbd8f401ba8c78978d97cd20f63b6d348978bca796f852b942873fab9777682e5e914b6c9eaf345dc93178f3f2dd287b89820000000000000000000000ec00001c9e746babb574b1fa04abe51dd4000320ee5c3b4c871dd965c387dd3ab0c12e7af8ce58c8a277f3acd07a96195163b040e7ef0ed30ab6abeaebb9086af9d225f218f31179e4b984391e7538b4ee3c886f3ff0581f8ce0ce3bfff615000000000000000000"]) 19:03:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:03:21 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed}, 0xe) 19:03:22 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:03:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x14}) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) 19:03:22 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) [ 1238.510314] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1238.513363] EXT4-fs (loop2): get root inode failed [ 1238.514770] EXT4-fs (loop2): mount failed 19:03:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f42", 0x24}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:03:35 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:03:35 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:03:35 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed}, 0xe) 19:03:35 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:03:35 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:03:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x14}) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) 19:03:35 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f42", 0x24}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:03:35 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:03:35 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) [ 1252.246756] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1252.255034] EXT4-fs (loop2): get root inode failed [ 1252.256039] EXT4-fs (loop2): mount failed 19:03:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x14}) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) 19:03:35 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, 0x0, 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:03:35 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed}, 0xe) 19:03:35 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:03:35 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:03:35 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) [ 1252.602397] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1252.615234] EXT4-fs (loop2): get root inode failed [ 1252.616298] EXT4-fs (loop2): mount failed 19:03:36 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f42", 0x24}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:03:36 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, 0x0, 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:03:49 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:03:49 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, 0x0, 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x20) 19:03:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:03:49 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) 19:03:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:03:49 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:03:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271", 0x25}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:03:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x14}) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) 19:03:49 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:03:49 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) [ 1266.324618] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 19:03:49 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(0x0, 0x20) 19:03:49 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {0x0, 0x0, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:03:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:03:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:03:50 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) (fail_nth: 1) 19:03:50 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e23, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:03:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271", 0x25}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:03:50 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) [ 1266.707816] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1266.719798] EXT4-fs (loop2): get root inode failed [ 1266.720988] EXT4-fs (loop2): mount failed [ 1266.796687] FAULT_INJECTION: forcing a failure. 19:03:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) [ 1266.796687] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 1266.799678] CPU: 1 PID: 10152 Comm: syz-executor.1 Not tainted 5.10.159 #1 [ 1266.801152] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1266.803049] Call Trace: [ 1266.803628] dump_stack+0x107/0x167 [ 1266.804490] should_fail.cold+0x5/0xa [ 1266.805307] _copy_from_user+0x2e/0x1b0 [ 1266.806182] move_addr_to_kernel.part.0+0x31/0x110 [ 1266.807287] __sys_connect+0xda/0x1a0 [ 1266.808059] ? __sys_connect_file+0x1a0/0x1a0 [ 1266.809155] ? rcu_read_lock_any_held+0x75/0xa0 [ 1266.810138] ? vfs_write+0x354/0xa30 [ 1266.811048] ? fput_many+0x2f/0x1a0 [ 1266.811799] ? ksys_write+0x1a9/0x260 [ 1266.812758] __x64_sys_connect+0x6f/0xb0 [ 1266.813572] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1266.814612] do_syscall_64+0x33/0x40 [ 1266.815470] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1266.816492] RIP: 0033:0x7fb7e97bbb19 [ 1266.817237] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1266.820981] RSP: 002b:00007fb7e6d31188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 1266.822631] RAX: ffffffffffffffda RBX: 00007fb7e98cef60 RCX: 00007fb7e97bbb19 [ 1266.824108] RDX: 000000000000000e RSI: 0000000020000000 RDI: 0000000000000007 [ 1266.825646] RBP: 00007fb7e6d311d0 R08: 0000000000000000 R09: 0000000000000000 [ 1266.827135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1266.828642] R13: 00007ffdc965143f R14: 00007fb7e6d31300 R15: 0000000000022000 19:04:05 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:04:05 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(0x0, 0x20) 19:04:05 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271", 0x25}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:04:05 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) 19:04:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:04:05 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {0x0, 0x0, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000f256bcd97d4240ebf0300a003ec517b121b66ceaf65946de73018975a28a3770f47c701d70504000000000000006b86cfba5e16d772d269221414b9da9406ad12e2e4717e7103e052a894962ae411ca375d3c2549f4fb0d5654fc9e641f5dd20803928b69bd2138eb5d09fabdc96bc3cb22ad151e1ee50a0c03b4c1688e830a1d552f5590a74a6699f38857a60f94f8a36f1a8a7da7a6d6b174e55a559ebf302fa04f7096fbd8f401ba8c78978d97cd20f63b6d348978bca796f852b942873fab9777682e5e914b6c9eaf345dc93178f3f2dd287b89820000000000000000000000ec00001c9e746babb574b1fa04abe51dd4000320ee5c3b4c871dd965c387dd3ab0c12e7af8ce58c8a277f3acd07a96195163b040e7ef0ed30ab6abeaebb9086af9d225f218f31179e4b984391e7538b4ee3c886f3ff0581f8ce0ce3bfff615000000000000000000"]) 19:04:05 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:04:05 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) (fail_nth: 2) 19:04:05 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) 19:04:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) [ 1281.849306] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1281.852716] EXT4-fs (loop2): get root inode failed [ 1281.853607] EXT4-fs (loop2): mount failed [ 1281.873656] FAULT_INJECTION: forcing a failure. [ 1281.873656] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1281.876672] CPU: 1 PID: 10280 Comm: syz-executor.1 Not tainted 5.10.159 #1 [ 1281.878316] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1281.880178] Call Trace: [ 1281.880755] dump_stack+0x107/0x167 [ 1281.881534] should_fail.cold+0x5/0xa [ 1281.882371] _copy_to_user+0x2e/0x180 [ 1281.883190] simple_read_from_buffer+0xcc/0x160 [ 1281.884187] proc_fail_nth_read+0x198/0x230 [ 1281.885106] ? proc_sessionid_read+0x230/0x230 [ 1281.886092] ? security_file_permission+0x24e/0x570 [ 1281.887156] ? perf_trace_initcall_start+0x101/0x380 [ 1281.888251] ? proc_sessionid_read+0x230/0x230 [ 1281.889230] vfs_read+0x228/0x580 [ 1281.889981] ksys_read+0x12d/0x260 [ 1281.890776] ? vfs_write+0xa30/0xa30 [ 1281.891570] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1281.892742] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1281.893895] do_syscall_64+0x33/0x40 [ 1281.894744] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1281.896065] RIP: 0033:0x7fb7e976e69c [ 1281.896896] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1281.901237] RSP: 002b:00007fb7e6d31170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1281.902942] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fb7e976e69c [ 1281.904529] RDX: 000000000000000f RSI: 00007fb7e6d311e0 RDI: 0000000000000006 [ 1281.906126] RBP: 00007fb7e6d311d0 R08: 0000000000000000 R09: 0000000000000000 [ 1281.907855] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1281.909450] R13: 00007ffdc965143f R14: 00007fb7e6d31300 R15: 0000000000022000 19:04:05 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(0x0, 0x20) 19:04:20 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:04:20 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:04:20 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) 19:04:20 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x2, 0x17, 0x0) 19:04:20 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {0x0, 0x0, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:04:20 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:04:20 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) 19:04:20 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) [ 1297.247877] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1297.275502] EXT4-fs (loop2): get root inode failed [ 1297.276721] EXT4-fs (loop2): mount failed 19:04:20 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:04:20 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010e00), 0x0, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:04:20 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x700, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:04:20 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) 19:04:20 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:04:20 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) 19:04:21 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x2, 0x17, 0x0) [ 1297.639535] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1297.642923] EXT4-fs (loop2): get root inode failed [ 1297.644057] EXT4-fs (loop2): mount failed 19:04:21 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:04:37 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:04:37 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @private2, 0x2}, 0x1c) 19:04:37 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010e00), 0x0, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:04:37 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:04:37 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) 19:04:37 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(0x0, 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:04:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x2, 0x17, 0x0) 19:04:37 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x2}, 0xe) [ 1313.736767] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1313.739794] EXT4-fs (loop2): get root inode failed [ 1313.740915] EXT4-fs (loop2): mount failed 19:04:37 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010e00), 0x0, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000f256bcd97d4240ebf0300a003ec517b121b66ceaf65946de73018975a28a3770f47c701d70504000000000000006b86cfba5e16d772d269221414b9da9406ad12e2e4717e7103e052a894962ae411ca375d3c2549f4fb0d5654fc9e641f5dd20803928b69bd2138eb5d09fabdc96bc3cb22ad151e1ee50a0c03b4c1688e830a1d552f5590a74a6699f38857a60f94f8a36f1a8a7da7a6d6b174e55a559ebf302fa04f7096fbd8f401ba8c78978d97cd20f63b6d348978bca796f852b942873fab9777682e5e914b6c9eaf345dc93178f3f2dd287b89820000000000000000000000ec00001c9e746babb574b1fa04abe51dd4000320ee5c3b4c871dd965c387dd3ab0c12e7af8ce58c8a277f3acd07a96195163b040e7ef0ed30ab6abeaebb9086af9d225f218f31179e4b984391e7538b4ee3c886f3ff0581f8ce0ce3bfff615000000000000000000"]) 19:04:37 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(0x0, 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:04:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 1) 19:04:37 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:04:37 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r0, &(0x7f00000017c0)={[0x4]}, 0x8, 0x80800) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)}, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000001fc0)={0x0, 0x9, 0x3f}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001800)=ANY=[@ANYBLOB="184000000000000000001705cbe4c9b86100008a5307f0"], 0x18}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000016c0)={&(0x7f00000014c0)=ANY=[@ANYBLOB="d80100001a0000012bbd7000fedbdf250500000074a1822992df47c679ff91033f82075fbd6b9a7985b0ffd39693e6fdd17a706c51ca2ee541aae7c53e189bf5b6f0fe0cc41a0935d8f346cc11bb31bc8b2496d30f96d12ce9287a0e25823c516b8344c2f6f6a3d47c682d064ee0d930dee11664eb2593674afc92ebe7f154e73bfdc668711e6d485f2832bee749aba6dcc15ef409195254b016c09eb358068d13bbc42984a39d3e2be2d91bc4162e55259e41b86468e5a11cf3a084916d82539e49f5d4cda39b216f1ad72273760512e90176e671d5febafca3799434e6fb5b64afb003b6d73b4c8562ff391fd6008c80362b280f880a0f0c9b22ac2bac629328b094d2c7409ccdcf9325af4d3a132bc9957d377e16cbecb4970dbb7825f5d2031596d266f4b5d570a63a54e48c0395b02c9a7fc2e5469870ca88073e06ccc2c90ae67f69330c241b6ffe21c13efb430721b343fa3a5348723e680ffaf4e7fde8410a4d105ab7de8afd338d82a13f9e0458b624bb417f355cc0b00477ada484b6ab04bfbf3ec9b08bc12f4388e669cb623537aa1f2b825edbf4e79e6bd66da553d38b4f207ead75ec59fdae9bffef3083f6eaa1bb311e9d258ad434b72b7f7dc02d3e000008002900010000000800580000000000000000"], 0x1d8}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/170, 0xaa}], 0x1) readv(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001740)={0x2, 0x80, 0x3, 0x3f, 0x1, 0xd, 0x0, 0x7, 0x800, 0x5c2961b1ad52961d, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0xd4, 0xd}, 0x8000, 0x1, 0x1, 0x0, 0x9, 0x2, 0x7, 0x0, 0x5, 0x0, 0x7b}, 0xffffffffffffffff, 0xd, r0, 0x1) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0xc00, 0x0) clone3(&(0x7f0000001e00)={0x1200400, &(0x7f00000019c0), &(0x7f0000001bc0)=0x0, &(0x7f0000001b80), {0xbe}, &(0x7f0000001f00)=""/149, 0x95, &(0x7f0000001d00)=""/170, &(0x7f0000001dc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3}, 0x58) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x57, 0x5c, 0x0, 0x9, 0x0, 0x0, 0x42, 0x7, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x100000000, 0x6}, 0x100, 0x0, 0x2, 0x7, 0x3800000, 0x100, 0x7e6, 0x0, 0xe0, 0x0, 0x5}, r2, 0x5, r1, 0x12) r3 = syz_open_dev$vcsa(&(0x7f0000000280), 0xade0, 0x400200) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000001840)={'HL\x00'}, &(0x7f0000001880)=0x1e) perf_event_open(0xffffffffffffffff, r2, 0xf, r0, 0xa) readv(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000140)=""/6, 0x6}, {&(0x7f00000013c0)=""/193, 0xc1}], 0x4) socket$netlink(0x10, 0x3, 0x15) ftruncate(0xffffffffffffffff, 0x0) unshare(0x48020200) [ 1313.992244] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1314.012399] EXT4-fs (loop2): get root inode failed [ 1314.013672] EXT4-fs (loop2): mount failed 19:04:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) [ 1314.158990] FAULT_INJECTION: forcing a failure. [ 1314.158990] name failslab, interval 1, probability 0, space 0, times 1 [ 1314.161320] CPU: 1 PID: 10792 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1314.162729] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1314.164411] Call Trace: [ 1314.164956] dump_stack+0x107/0x167 [ 1314.165706] should_fail.cold+0x5/0xa [ 1314.166506] ? getname_flags.part.0+0x50/0x4f0 [ 1314.167448] should_failslab+0x5/0x20 [ 1314.168228] kmem_cache_alloc+0x5b/0x360 [ 1314.169073] getname_flags.part.0+0x50/0x4f0 [ 1314.169983] getname+0x8e/0xd0 [ 1314.170666] do_sys_openat2+0xf9/0x420 [ 1314.171467] ? build_open_flags+0x690/0x690 [ 1314.172352] ? wait_for_completion+0x270/0x270 [ 1314.173291] ? rcu_read_lock_any_held+0x75/0xa0 [ 1314.174239] ? vfs_write+0x354/0xa30 [ 1314.175018] __x64_sys_creat+0xc9/0x120 [ 1314.175833] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 1314.176863] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1314.177934] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1314.178996] ? trace_hardirqs_on+0x5b/0x180 [ 1314.179881] do_syscall_64+0x33/0x40 [ 1314.180643] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1314.181692] RIP: 0033:0x7f8428451b19 [ 1314.182473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1314.186231] RSP: 002b:00007f84259a6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1314.187794] RAX: ffffffffffffffda RBX: 00007f8428565020 RCX: 00007f8428451b19 [ 1314.189254] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 1314.190721] RBP: 00007f84259a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1314.192175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1314.193636] R13: 00007ffc9c2fdc9f R14: 00007f84259a6300 R15: 0000000000022000 19:04:37 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f465", 0xf, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:04:37 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(0x0, 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) [ 1314.401654] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1314.404799] EXT4-fs (loop2): get root inode failed [ 1314.405841] EXT4-fs (loop2): mount failed 19:04:51 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:04:51 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @private2}, 0x1c) 19:04:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0xffff7752, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) 19:04:51 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x0, 0x2}, 0xe) 19:04:51 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f465", 0xf, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:04:51 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 2) 19:04:51 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:04:51 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c) [ 1328.312466] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1328.319703] EXT4-fs (loop2): get root inode failed [ 1328.320394] FAULT_INJECTION: forcing a failure. [ 1328.320394] name failslab, interval 1, probability 0, space 0, times 0 [ 1328.321173] EXT4-fs (loop2): mount failed [ 1328.322135] CPU: 0 PID: 10921 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1328.322158] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1328.324865] Call Trace: [ 1328.325187] dump_stack+0x107/0x167 [ 1328.325597] should_fail.cold+0x5/0xa [ 1328.326047] ? create_object.isra.0+0x3a/0xa20 [ 1328.326553] should_failslab+0x5/0x20 [ 1328.326994] kmem_cache_alloc+0x5b/0x360 [ 1328.327454] create_object.isra.0+0x3a/0xa20 [ 1328.327946] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1328.328505] kmem_cache_alloc+0x159/0x360 [ 1328.328997] getname_flags.part.0+0x50/0x4f0 [ 1328.329492] getname+0x8e/0xd0 [ 1328.329867] do_sys_openat2+0xf9/0x420 [ 1328.330298] ? build_open_flags+0x690/0x690 [ 1328.330808] ? wait_for_completion+0x270/0x270 [ 1328.331307] ? rcu_read_lock_any_held+0x75/0xa0 [ 1328.331818] ? vfs_write+0x354/0xa30 [ 1328.332234] __x64_sys_creat+0xc9/0x120 [ 1328.332666] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 1328.333247] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1328.333813] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1328.334391] ? trace_hardirqs_on+0x5b/0x180 [ 1328.334867] do_syscall_64+0x33/0x40 [ 1328.335284] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1328.335820] RIP: 0033:0x7f8428451b19 [ 1328.336247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1328.338269] RSP: 002b:00007f84259c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1328.339110] RAX: ffffffffffffffda RBX: 00007f8428564f60 RCX: 00007f8428451b19 [ 1328.339904] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 1328.340694] RBP: 00007f84259c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 1328.341471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1328.342269] R13: 00007ffc9c2fdc9f R14: 00007f84259c7300 R15: 0000000000022000 19:04:51 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(0x0, 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:04:51 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:04:51 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 3) 19:04:51 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0x2000000e) 19:04:51 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f465", 0xf, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) [ 1328.667753] FAULT_INJECTION: forcing a failure. [ 1328.667753] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1328.670675] CPU: 1 PID: 11040 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1328.672071] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1328.673755] Call Trace: 19:04:52 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) [ 1328.674301] dump_stack+0x107/0x167 [ 1328.675253] should_fail.cold+0x5/0xa [ 1328.676078] strncpy_from_user+0x34/0x470 [ 1328.677081] getname_flags.part.0+0x95/0x4f0 [ 1328.678120] getname+0x8e/0xd0 [ 1328.678798] do_sys_openat2+0xf9/0x420 [ 1328.679752] ? build_open_flags+0x690/0x690 [ 1328.680804] ? wait_for_completion+0x270/0x270 [ 1328.681810] ? rcu_read_lock_any_held+0x75/0xa0 [ 1328.682879] ? vfs_write+0x354/0xa30 [ 1328.683774] __x64_sys_creat+0xc9/0x120 [ 1328.684610] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 1328.685820] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1328.687015] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1328.688208] ? trace_hardirqs_on+0x5b/0x180 [ 1328.689290] do_syscall_64+0x33/0x40 [ 1328.690073] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1328.691377] RIP: 0033:0x7f8428451b19 [ 1328.692338] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1328.696611] RSP: 002b:00007f84259c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1328.698356] RAX: ffffffffffffffda RBX: 00007f8428564f60 RCX: 00007f8428451b19 [ 1328.699867] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 1328.701422] RBP: 00007f84259c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 1328.703156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1328.704595] R13: 00007ffc9c2fdc9f R14: 00007f84259c7300 R15: 0000000000022000 [ 1328.726690] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1328.729369] EXT4-fs (loop2): get root inode failed [ 1328.730546] EXT4-fs (loop2): mount failed 19:04:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001d00210c000000000000000004000200450011801aa42477b8f0a81e9d30b50aa5199e04f2a93c40c54e3ef84a7593388c48c5e111fe4c570cb23489cf7dda9592cd3b2d981c236ad40251696ca226e00eebb7bedc000000acab2e4033791fe19f7c8d6bf8c72d843bfd77d8075db64555e1f546fb23a04504424c8079f430e891255d72225e8ae84610c4039dc08fd8ee510aacb8e5cae3fd583c023f7167235dc7cd1ac6120aaff3900e811fdb0568c391631135"], 0x5c}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000000fc0)=[{{&(0x7f00000002c0)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x4004810) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000080)={0xffffffffffffffe1, 0x8, '\x00', 0x0, &(0x7f0000000040)=[0x0]}) 19:04:52 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 19:05:05 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:05:05 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000", 0x16, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000f256bcd97d4240ebf0300a003ec517b121b66ceaf65946de73018975a28a3770f47c701d70504000000000000006b86cfba5e16d772d269221414b9da9406ad12e2e4717e7103e052a894962ae411ca375d3c2549f4fb0d5654fc9e641f5dd20803928b69bd2138eb5d09fabdc96bc3cb22ad151e1ee50a0c03b4c1688e830a1d552f5590a74a6699f38857a60f94f8a36f1a8a7da7a6d6b174e55a559ebf302fa04f7096fbd8f401ba8c78978d97cd20f63b6d348978bca796f852b942873fab9777682e5e914b6c9eaf345dc93178f3f2dd287b89820000000000000000000000ec00001c9e746babb574b1fa04abe51dd4000320ee5c3b4c871dd965c387dd3ab0c12e7af8ce58c8a277f3acd07a96195163b040e7ef0ed30ab6abeaebb9086af9d225f218f31179e4b984391e7538b4ee3c886f3ff0581f8ce0ce3bfff615000000000000000000"]) 19:05:05 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @private2, 0x2}, 0x1c) 19:05:05 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 4) 19:05:05 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x0, 0x3f, 0x3f, 0x8, 0x0, 0x6, 0x1000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x3, 0x2}, 0x546, 0x4, 0x90d, 0x9, 0xfff, 0xff, 0x9, 0x0, 0x8000, 0x0, 0x100}, 0xffffffffffffffff, 0x10, r1, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r2) perf_event_open(&(0x7f0000001d80)={0x2, 0xd3, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext={0x200000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x80000001}, 0x0, 0x0, r2, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:05:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) 19:05:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./mnt\x00', &(0x7f0000000400)='system.posix_acl_default\x00', &(0x7f0000000140)={{}, {}, [], {}, [{0x8, 0x5}, {0x8, 0x2}, {}, {0x8, 0x7}, {0x8, 0x1}]}, 0x4c, 0x0) syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f00000001c0)='./mnt\x00', 0x1, 0x5, &(0x7f0000000500)=[{&(0x7f0000000200), 0x0, 0xffffffffffffffb7}, {&(0x7f0000000240)="ffb34b2a663c3bc8b3711716dbb157249c902a843c181a68c366c6f7b666b4dbc642ace4ce730e4dfb1ebf719c54c8e47b56dae11b800eb9d614906dcc5a0fd12e5a596434351c281c9eaf0a196b0088f0bb01af27066bc3cdceeef5163cffa6f2c3711909401a9a62cefa594da2b9ac26c7f64dd3cbd57a51ff53beec4e3888a0e7869f644209024156da0fda85d655fe14361cddb764a21204b0c6435dc00609f611c6a7", 0xa5, 0x1}, {&(0x7f0000000300)="d95f6e53254c8fc01cf8644320c7e7640f5c8efdb6c790f3e76baec2d747e6750b217e7cff623aee052d5e3ad1382fbe8a04e975e9b33640b625ead4d2a5ecf0297838d0fad20d0104c37111ff9fdd65654cb8d2a09afddc4e62e43ab27e3fb5a89bb405", 0x64, 0x892}, {&(0x7f0000000380)="7f7edcbc1b3771e571834956a679eeab0fda6f98cb06e033242e6d67961db99996a7c2c7dd3c46412c0e060e89351c472e17bb4041679c0d66472d42754156c58d7252fa872407f6c4de58ca1f1cfeb7afa2771847ff", 0x56, 0x1}, {&(0x7f0000000440)="2f0c8ede7d40d8c0a3e7e66b7caaa29d62e32219115d5295785d881884afac6908e9846bfa8b529e870fbd17e4a87dd5952f15b89d4b4540cc93d341cc59fe9d8e3a0eaef3759d50da06b635469c3fef83b150efcf6ba8a68303f667b111d8b2cca7a8e4623b4d5f", 0x68, 0x101}], 0x1002402, &(0x7f0000000840)={[{}, {'system.posix_acl_default\x00'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\xad\xcbK\x19\x13\x03\xf0k\x82{\r\x9f67\xc4\x83\xa7vK\xa1\x8bER\xb7C=\b\xb1\xe6\x9d\x14[f\xbc\xcd\x98\r\x992\x9a\xb1^\xc3\xd5\'\xd9\x81\n\xc1\xee?CB\x9d\x9f\'W\v\x90-\"h8q\xb4R/\x8c\xdb\x81.\xba\xb79b\x95v\xecb\x95\xbd|'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'system.posix_acl_default\x00'}}, {@obj_user={'obj_user', 0x3d, '!\xc8,![:@\\'}}, {@subj_user={'subj_user', 0x3d, '\''}}]}) accept4$unix(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000680)=0x6e, 0x100000) stat(&(0x7f0000000780)='./mnt\x00', &(0x7f00000007c0)) chroot(&(0x7f0000000000)='mnt/encrypted_dir\x00') syz_mount_image$ext4(0x0, &(0x7f0000000040)='./mnt/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rmdir(&(0x7f0000000200)='./mnt/file0\x00') mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) 19:05:05 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @private2}, 0x1c) (fail_nth: 1) [ 1341.730471] FAULT_INJECTION: forcing a failure. [ 1341.730471] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1341.732542] CPU: 1 PID: 11172 Comm: syz-executor.7 Not tainted 5.10.159 #1 [ 1341.733846] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1341.735124] Call Trace: [ 1341.735553] dump_stack+0x107/0x167 [ 1341.736128] should_fail.cold+0x5/0xa [ 1341.736755] _copy_from_user+0x2e/0x1b0 [ 1341.737393] move_addr_to_kernel.part.0+0x31/0x110 [ 1341.738137] __sys_connect+0xda/0x1a0 [ 1341.738731] ? __sys_connect_file+0x1a0/0x1a0 [ 1341.739419] ? rcu_read_lock_any_held+0x75/0xa0 [ 1341.740049] ? vfs_write+0x354/0xa30 [ 1341.740560] ? fput_many+0x2f/0x1a0 [ 1341.741049] ? ksys_write+0x1a9/0x260 [ 1341.741581] __x64_sys_connect+0x6f/0xb0 [ 1341.742102] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1341.742780] do_syscall_64+0x33/0x40 [ 1341.743284] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1341.743978] RIP: 0033:0x7f65f84f9b19 [ 1341.744491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1341.746924] RSP: 002b:00007f65f5a6f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 1341.747931] RAX: ffffffffffffffda RBX: 00007f65f860cf60 RCX: 00007f65f84f9b19 [ 1341.748902] RDX: 000000000000001c RSI: 0000000020000200 RDI: 0000000000000004 [ 1341.749850] RBP: 00007f65f5a6f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1341.750813] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1341.751764] R13: 00007fffbdbfbb8f R14: 00007f65f5a6f300 R15: 0000000000022000 [ 1341.782062] FAULT_INJECTION: forcing a failure. [ 1341.782062] name failslab, interval 1, probability 0, space 0, times 0 [ 1341.784375] CPU: 1 PID: 11179 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1341.785464] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1341.786745] Call Trace: [ 1341.787163] dump_stack+0x107/0x167 [ 1341.787739] should_fail.cold+0x5/0xa [ 1341.788336] ? __alloc_file+0x21/0x320 [ 1341.788941] ? __alloc_file+0x21/0x320 [ 1341.789553] should_failslab+0x5/0x20 [ 1341.790131] kmem_cache_alloc+0x5b/0x360 [ 1341.790774] __alloc_file+0x21/0x320 [ 1341.791361] alloc_empty_file+0x6d/0x170 [ 1341.792007] path_openat+0xde/0x26d0 [ 1341.792628] ? mark_held_locks+0x9e/0xe0 [ 1341.793276] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1341.794149] ? trace_hardirqs_on+0x5b/0x180 [ 1341.794872] ? path_lookupat+0x860/0x860 [ 1341.795468] ? perf_trace_lock+0xac/0x490 [ 1341.796160] ? __lockdep_reset_lock+0x180/0x180 [ 1341.796812] do_filp_open+0x17e/0x3d0 [ 1341.797359] ? may_open_dev+0xf0/0xf0 [ 1341.797882] ? __alloc_fd+0x2a5/0x620 [ 1341.798407] ? lock_downgrade+0x6d0/0x6d0 [ 1341.799009] ? rwlock_bug.part.0+0x90/0x90 [ 1341.799591] ? _raw_spin_unlock+0x1a/0x30 [ 1341.800150] ? __alloc_fd+0x2a5/0x620 [ 1341.800694] do_sys_openat2+0x171/0x420 [ 1341.801240] ? build_open_flags+0x690/0x690 [ 1341.801834] ? wait_for_completion+0x270/0x270 [ 1341.802466] ? rcu_read_lock_any_held+0x75/0xa0 [ 1341.803154] ? vfs_write+0x354/0xa30 [ 1341.803789] __x64_sys_creat+0xc9/0x120 [ 1341.804475] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 1341.805318] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1341.806136] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1341.806883] ? trace_hardirqs_on+0x5b/0x180 [ 1341.807471] do_syscall_64+0x33/0x40 [ 1341.807995] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1341.808733] RIP: 0033:0x7f8428451b19 [ 1341.809250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1341.811853] RSP: 002b:00007f84259a6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1341.812939] RAX: ffffffffffffffda RBX: 00007f8428565020 RCX: 00007f8428451b19 [ 1341.813912] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 1341.814886] RBP: 00007f84259a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1341.815877] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1341.816872] R13: 00007ffc9c2fdc9f R14: 00007f84259a6300 R15: 0000000000022000 19:05:05 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @private2}, 0x1c) (fail_nth: 2) [ 1341.852657] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1341.867805] EXT4-fs (loop2): get root inode failed [ 1341.869103] EXT4-fs (loop2): mount failed 19:05:05 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000", 0x16, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:05:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) 19:05:05 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x6f, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x41, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x50) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r4) recvmsg$unix(r2, &(0x7f0000000500)={&(0x7f0000000080), 0x6e, &(0x7f0000000440)=[{&(0x7f0000000140)=""/179, 0xb3}, {&(0x7f0000000200)=""/107, 0x6b}, {&(0x7f0000000280)=""/158, 0x9e}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000000340)=""/222, 0xde}, {&(0x7f0000001e00)=""/4096, 0x1000}], 0x6, &(0x7f0000000580)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000000a5282eab77cfca98229ca45f364385161edc57bee825ee8da560af99218de7d7f164970d6a6a3a3d2b77e54817955f0526157caef60351707279980929f7d5bf64b899ef8968df66669c09fcb6ff1ea56704027443d703de8ce1048dc18732189ca9235dc31590af39be1bb59696"], 0x40}, 0x100) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) dup2(r0, r3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r6, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 1342.011382] FAULT_INJECTION: forcing a failure. [ 1342.011382] name failslab, interval 1, probability 0, space 0, times 0 [ 1342.014016] CPU: 0 PID: 11288 Comm: syz-executor.7 Not tainted 5.10.159 #1 [ 1342.015419] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1342.017083] Call Trace: [ 1342.017629] dump_stack+0x107/0x167 [ 1342.018378] should_fail.cold+0x5/0xa [ 1342.019174] ? __inet_hash_connect+0x843/0xee0 [ 1342.020099] should_failslab+0x5/0x20 [ 1342.020869] kmem_cache_alloc+0x5b/0x360 [ 1342.021710] __inet_hash_connect+0x843/0xee0 [ 1342.022612] ? __inet6_lookup_established+0xa90/0xa90 [ 1342.023679] ? inet_hash+0x80/0x80 [ 1342.024444] tcp_v6_connect+0x114c/0x1be0 [ 1342.025308] ? rt6_get_cookie+0x390/0x390 [ 1342.026224] __inet_stream_connect+0x816/0xd50 [ 1342.027160] ? lock_release+0x6b0/0x6b0 [ 1342.027966] ? lock_downgrade+0x6d0/0x6d0 [ 1342.028803] ? inet_init_net+0x5a0/0x5a0 [ 1342.029633] ? mark_held_locks+0x9e/0xe0 [ 1342.030461] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1342.031534] ? __local_bh_enable_ip+0x9d/0x100 [ 1342.032474] inet_stream_connect+0x53/0xa0 [ 1342.033330] ? __inet_stream_connect+0xd50/0xd50 [ 1342.034289] __sys_connect_file+0x15b/0x1a0 [ 1342.035180] __sys_connect+0x165/0x1a0 [ 1342.035970] ? __sys_connect_file+0x1a0/0x1a0 [ 1342.037068] ? vfs_write+0x354/0xa30 [ 1342.037839] ? fput_many+0x2f/0x1a0 [ 1342.038582] ? ksys_write+0x1a9/0x260 [ 1342.039402] __x64_sys_connect+0x6f/0xb0 [ 1342.040227] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1342.041276] do_syscall_64+0x33/0x40 [ 1342.042032] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1342.043080] RIP: 0033:0x7f65f84f9b19 19:05:05 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 5) [ 1342.043838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1342.047771] RSP: 002b:00007f65f5a6f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 1342.049309] RAX: ffffffffffffffda RBX: 00007f65f860cf60 RCX: 00007f65f84f9b19 [ 1342.050739] RDX: 000000000000001c RSI: 0000000020000200 RDI: 0000000000000004 [ 1342.052207] RBP: 00007f65f5a6f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1342.053649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1342.055100] R13: 00007fffbdbfbb8f R14: 00007f65f5a6f300 R15: 0000000000022000 19:05:05 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:05:05 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @private2}, 0x1c) (fail_nth: 3) 19:05:05 executing program 3: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x0, 0x3f, 0x3f, 0x8, 0x0, 0x6, 0x1000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x3, 0x2}, 0x546, 0x4, 0x90d, 0x9, 0xfff, 0xff, 0x9, 0x0, 0x8000, 0x0, 0x100}, 0xffffffffffffffff, 0x10, r1, 0xb) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r2) perf_event_open(&(0x7f0000001d80)={0x2, 0xd3, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext={0x200000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x80000001}, 0x0, 0x0, r2, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 1342.262265] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1342.266603] EXT4-fs (loop2): get root inode failed [ 1342.267751] EXT4-fs (loop2): mount failed 19:05:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) [ 1342.319085] FAULT_INJECTION: forcing a failure. [ 1342.319085] name failslab, interval 1, probability 0, space 0, times 0 [ 1342.321459] CPU: 0 PID: 11306 Comm: syz-executor.7 Not tainted 5.10.159 #1 [ 1342.322960] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1342.324612] Call Trace: [ 1342.325165] dump_stack+0x107/0x167 [ 1342.325915] should_fail.cold+0x5/0xa [ 1342.326690] ? create_object.isra.0+0x3a/0xa20 [ 1342.327625] should_failslab+0x5/0x20 [ 1342.328405] kmem_cache_alloc+0x5b/0x360 [ 1342.329229] ? lock_release+0x6b0/0x6b0 [ 1342.330045] create_object.isra.0+0x3a/0xa20 [ 1342.330958] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1342.331997] kmem_cache_alloc+0x159/0x360 [ 1342.332998] __inet_hash_connect+0x843/0xee0 [ 1342.333917] ? __inet6_lookup_established+0xa90/0xa90 [ 1342.335286] ? inet_hash+0x80/0x80 [ 1342.336055] tcp_v6_connect+0x114c/0x1be0 [ 1342.337095] ? rt6_get_cookie+0x390/0x390 [ 1342.338023] __inet_stream_connect+0x816/0xd50 [ 1342.339171] ? lock_release+0x6b0/0x6b0 [ 1342.339981] ? lock_downgrade+0x6d0/0x6d0 [ 1342.341000] ? inet_init_net+0x5a0/0x5a0 [ 1342.341837] ? mark_held_locks+0x9e/0xe0 [ 1342.342860] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1342.343926] ? __local_bh_enable_ip+0x9d/0x100 [ 1342.345058] inet_stream_connect+0x53/0xa0 [ 1342.345925] ? __inet_stream_connect+0xd50/0xd50 [ 1342.347092] __sys_connect_file+0x15b/0x1a0 [ 1342.348018] __sys_connect+0x165/0x1a0 [ 1342.348815] ? __sys_connect_file+0x1a0/0x1a0 [ 1342.349918] ? vfs_write+0x354/0xa30 [ 1342.350694] ? fput_many+0x2f/0x1a0 [ 1342.351621] ? ksys_write+0x1a9/0x260 [ 1342.352428] __x64_sys_connect+0x6f/0xb0 [ 1342.353425] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1342.354473] do_syscall_64+0x33/0x40 [ 1342.355402] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1342.356443] RIP: 0033:0x7f65f84f9b19 [ 1342.357353] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1342.361067] RSP: 002b:00007f65f5a6f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 1342.362941] RAX: ffffffffffffffda RBX: 00007f65f860cf60 RCX: 00007f65f84f9b19 [ 1342.364404] RDX: 000000000000001c RSI: 0000000020000200 RDI: 0000000000000004 [ 1342.365847] RBP: 00007f65f5a6f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1342.367316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1342.368760] R13: 00007fffbdbfbb8f R14: 00007f65f5a6f300 R15: 0000000000022000 [ 1342.371241] FAULT_INJECTION: forcing a failure. [ 1342.371241] name failslab, interval 1, probability 0, space 0, times 0 [ 1342.373665] CPU: 0 PID: 11308 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1342.375138] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1342.376790] Call Trace: [ 1342.377450] dump_stack+0x107/0x167 [ 1342.378191] should_fail.cold+0x5/0xa [ 1342.379130] ? create_object.isra.0+0x3a/0xa20 [ 1342.380068] should_failslab+0x5/0x20 [ 1342.380833] kmem_cache_alloc+0x5b/0x360 [ 1342.381832] create_object.isra.0+0x3a/0xa20 [ 1342.382716] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1342.383789] kmem_cache_alloc+0x159/0x360 [ 1342.384629] __alloc_file+0x21/0x320 [ 1342.385384] alloc_empty_file+0x6d/0x170 [ 1342.386204] path_openat+0xde/0x26d0 [ 1342.387003] ? path_lookupat+0x860/0x860 [ 1342.387819] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1342.388870] ? SOFTIRQ_verbose+0x10/0x10 [ 1342.389680] ? lock_acquire+0x197/0x490 [ 1342.390496] do_filp_open+0x17e/0x3d0 [ 1342.391282] ? may_open_dev+0xf0/0xf0 [ 1342.392053] ? __alloc_fd+0x2a5/0x620 [ 1342.392826] ? lock_downgrade+0x6d0/0x6d0 [ 1342.393668] ? rwlock_bug.part.0+0x90/0x90 [ 1342.394524] ? _raw_spin_unlock+0x1a/0x30 [ 1342.395389] ? __alloc_fd+0x2a5/0x620 [ 1342.396170] do_sys_openat2+0x171/0x420 [ 1342.396967] ? build_open_flags+0x690/0x690 [ 1342.397832] ? wait_for_completion+0x270/0x270 [ 1342.398749] ? rcu_read_lock_any_held+0x75/0xa0 [ 1342.399696] ? vfs_write+0x354/0xa30 [ 1342.400451] __x64_sys_creat+0xc9/0x120 [ 1342.401251] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 1342.402255] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1342.403329] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1342.404362] ? trace_hardirqs_on+0x5b/0x180 [ 1342.405224] do_syscall_64+0x33/0x40 [ 1342.405971] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1342.407003] RIP: 0033:0x7f8428451b19 [ 1342.407760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1342.411434] RSP: 002b:00007f84259a6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1342.412965] RAX: ffffffffffffffda RBX: 00007f8428565020 RCX: 00007f8428451b19 [ 1342.414396] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 1342.415847] RBP: 00007f84259a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1342.417279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1342.418710] R13: 00007ffc9c2fdc9f R14: 00007f84259a6300 R15: 0000000000022000 19:05:05 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:05:06 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000", 0x16, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:05:06 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = dup2(r0, r3) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r7 = fcntl$dupfd(r2, 0x406, r5) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r8, 0xffffffffffffffff, 0x0, 0x7ffffff9) sendmsg$NL80211_CMD_RADAR_DETECT(r8, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x44, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x29}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x17a}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x9, 0x20, 0x1, 0x5e, 0x0, 0x2, 0x1, 0x9, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x10830, 0x48d, 0xf76, 0x0, 0x81, 0xfffffffd, 0x800, 0x0, 0x40, 0x0, 0xfff}, 0xffffffffffffffff, 0xd, r7, 0x2) connect$bt_l2cap(r6, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) r9 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r10 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r10, r9, 0x0, 0x7ffffff9) epoll_ctl$EPOLL_CTL_ADD(r10, 0x1, r4, &(0x7f00000000c0)={0x10000001}) 19:05:06 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @private2}, 0x1c) 19:05:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) [ 1342.768042] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1342.771498] EXT4-fs (loop2): get root inode failed [ 1342.773087] EXT4-fs (loop2): mount failed 19:05:24 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @private2}, 0x1c) 19:05:24 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 6) 19:05:24 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @private2}, 0x1c) 19:05:24 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28484, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xe, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:05:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, 0x0, 0x86) 19:05:24 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000", 0x1a, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000f256bcd97d4240ebf0300a003ec517b121b66ceaf65946de73018975a28a3770f47c701d70504000000000000006b86cfba5e16d772d269221414b9da9406ad12e2e4717e7103e052a894962ae411ca375d3c2549f4fb0d5654fc9e641f5dd20803928b69bd2138eb5d09fabdc96bc3cb22ad151e1ee50a0c03b4c1688e830a1d552f5590a74a6699f38857a60f94f8a36f1a8a7da7a6d6b174e55a559ebf302fa04f7096fbd8f401ba8c78978d97cd20f63b6d348978bca796f852b942873fab9777682e5e914b6c9eaf345dc93178f3f2dd287b89820000000000000000000000ec00001c9e746babb574b1fa04abe51dd4000320ee5c3b4c871dd965c387dd3ab0c12e7af8ce58c8a277f3acd07a96195163b040e7ef0ed30ab6abeaebb9086af9d225f218f31179e4b984391e7538b4ee3c886f3ff0581f8ce0ce3bfff615000000000000000000"]) 19:05:24 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) 19:05:24 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b", 0x6a}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) [ 1361.628513] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1361.649770] FAULT_INJECTION: forcing a failure. [ 1361.649770] name failslab, interval 1, probability 0, space 0, times 0 [ 1361.652399] CPU: 1 PID: 11447 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1361.653963] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1361.655855] Call Trace: [ 1361.656473] dump_stack+0x107/0x167 [ 1361.657312] should_fail.cold+0x5/0xa [ 1361.658189] ? security_file_alloc+0x34/0x170 [ 1361.659234] ? security_file_alloc+0x34/0x170 [ 1361.660333] should_failslab+0x5/0x20 [ 1361.661215] kmem_cache_alloc+0x5b/0x360 [ 1361.662212] security_file_alloc+0x34/0x170 [ 1361.663228] __alloc_file+0xb6/0x320 [ 1361.664147] alloc_empty_file+0x6d/0x170 [ 1361.665084] path_openat+0xde/0x26d0 [ 1361.666014] ? path_lookupat+0x860/0x860 [ 1361.666956] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1361.668242] ? SOFTIRQ_verbose+0x10/0x10 [ 1361.669173] ? lock_acquire+0x197/0x490 [ 1361.670158] do_filp_open+0x17e/0x3d0 [ 1361.671034] ? may_open_dev+0xf0/0xf0 [ 1361.671978] ? __alloc_fd+0x2a5/0x620 [ 1361.672857] ? lock_downgrade+0x6d0/0x6d0 [ 1361.673874] ? rwlock_bug.part.0+0x90/0x90 [ 1361.674864] ? _raw_spin_unlock+0x1a/0x30 [ 1361.675887] ? __alloc_fd+0x2a5/0x620 [ 1361.676787] do_sys_openat2+0x171/0x420 [ 1361.677690] ? build_open_flags+0x690/0x690 [ 1361.678674] ? wait_for_completion+0x270/0x270 [ 1361.679730] ? rcu_read_lock_any_held+0x75/0xa0 [ 1361.680794] ? vfs_write+0x354/0xa30 [ 1361.681647] __x64_sys_creat+0xc9/0x120 [ 1361.682559] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 1361.683701] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1361.684901] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1361.686068] ? trace_hardirqs_on+0x5b/0x180 [ 1361.687058] do_syscall_64+0x33/0x40 [ 1361.687934] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1361.689098] RIP: 0033:0x7f8428451b19 [ 1361.689944] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1361.694169] RSP: 002b:00007f84259c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1361.695912] RAX: ffffffffffffffda RBX: 00007f8428564f60 RCX: 00007f8428451b19 [ 1361.697535] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 1361.699185] RBP: 00007f84259c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 1361.700802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1361.702521] R13: 00007ffc9c2fdc9f R14: 00007f84259c7300 R15: 0000000000022000 [ 1361.723796] EXT4-fs (loop2): get root inode failed [ 1361.724921] EXT4-fs (loop2): mount failed 19:05:41 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) 19:05:41 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) openat(r3, &(0x7f00000000c0)='./file0\x00', 0x2000, 0xc0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x800, 0x101) 19:05:41 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0x2, 0x0, 0x0, @private2}, 0x1c) 19:05:41 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @private2}, 0x1c) 19:05:41 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000", 0x1a, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:05:41 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 7) 19:05:41 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b", 0x6a}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:05:41 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, 0x0, 0x86) [ 1377.716118] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1377.719048] EXT4-fs (loop2): get root inode failed [ 1377.720163] EXT4-fs (loop2): mount failed [ 1377.826582] FAULT_INJECTION: forcing a failure. [ 1377.826582] name failslab, interval 1, probability 0, space 0, times 0 [ 1377.828968] CPU: 0 PID: 11571 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1377.830407] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1377.832128] Call Trace: [ 1377.832691] dump_stack+0x107/0x167 [ 1377.833457] should_fail.cold+0x5/0xa [ 1377.834248] ? create_object.isra.0+0x3a/0xa20 [ 1377.835193] should_failslab+0x5/0x20 [ 1377.835994] kmem_cache_alloc+0x5b/0x360 [ 1377.836844] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 1377.837986] create_object.isra.0+0x3a/0xa20 [ 1377.838905] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1377.839970] kmem_cache_alloc+0x159/0x360 [ 1377.840842] security_file_alloc+0x34/0x170 [ 1377.841738] __alloc_file+0xb6/0x320 [ 1377.842514] alloc_empty_file+0x6d/0x170 [ 1377.843381] path_openat+0xde/0x26d0 [ 1377.844186] ? path_lookupat+0x860/0x860 [ 1377.845030] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1377.846106] ? SOFTIRQ_verbose+0x10/0x10 [ 1377.846943] ? lock_acquire+0x197/0x490 [ 1377.847800] do_filp_open+0x17e/0x3d0 [ 1377.848594] ? may_open_dev+0xf0/0xf0 [ 1377.849390] ? __alloc_fd+0x2a5/0x620 [ 1377.850185] ? lock_downgrade+0x6d0/0x6d0 [ 1377.851048] ? rwlock_bug.part.0+0x90/0x90 [ 1377.851961] ? _raw_spin_unlock+0x1a/0x30 [ 1377.852813] ? __alloc_fd+0x2a5/0x620 [ 1377.853629] do_sys_openat2+0x171/0x420 [ 1377.854462] ? build_open_flags+0x690/0x690 [ 1377.855382] ? wait_for_completion+0x270/0x270 [ 1377.856327] ? rcu_read_lock_any_held+0x75/0xa0 [ 1377.857284] ? vfs_write+0x354/0xa30 [ 1377.858064] __x64_sys_creat+0xc9/0x120 [ 1377.858887] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 1377.859926] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1377.861012] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1377.862071] ? trace_hardirqs_on+0x5b/0x180 [ 1377.862967] do_syscall_64+0x33/0x40 [ 1377.863752] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1377.864806] RIP: 0033:0x7f8428451b19 [ 1377.865575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1377.869338] RSP: 002b:00007f84259c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1377.870938] RAX: ffffffffffffffda RBX: 00007f8428564f60 RCX: 00007f8428451b19 [ 1377.872420] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 1377.873885] RBP: 00007f84259c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 1377.875356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1377.876816] R13: 00007ffc9c2fdc9f R14: 00007f84259c7300 R15: 0000000000022000 19:05:41 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0x3, 0x0, 0x0, @private2}, 0x1c) 19:05:41 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000", 0x1a, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000f256bcd97d4240ebf0300a003ec517b121b66ceaf65946de73018975a28a3770f47c701d70504000000000000006b86cfba5e16d772d269221414b9da9406ad12e2e4717e7103e052a894962ae411ca375d3c2549f4fb0d5654fc9e641f5dd20803928b69bd2138eb5d09fabdc96bc3cb22ad151e1ee50a0c03b4c1688e830a1d552f5590a74a6699f38857a60f94f8a36f1a8a7da7a6d6b174e55a559ebf302fa04f7096fbd8f401ba8c78978d97cd20f63b6d348978bca796f852b942873fab9777682e5e914b6c9eaf345dc93178f3f2dd287b89820000000000000000000000ec00001c9e746babb574b1fa04abe51dd4000320ee5c3b4c871dd965c387dd3ab0c12e7af8ce58c8a277f3acd07a96195163b040e7ef0ed30ab6abeaebb9086af9d225f218f31179e4b984391e7538b4ee3c886f3ff0581f8ce0ce3bfff615000000000000000000"]) 19:05:41 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, 0x0, 0x86) 19:05:41 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x0) mknodat$null(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1, 0x103) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x1000) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='numa_maps\x00') openat(r2, &(0x7f0000000480)='./file0/file0\x00', 0x240040, 0x22) readv(r2, &(0x7f0000003700)=[{&(0x7f0000000200)=""/216, 0xd8}, {&(0x7f00000003c0)=""/121, 0x79}, {&(0x7f0000000380)=""/51, 0x33}, {&(0x7f00000014c0)=""/160, 0xa0}, {&(0x7f0000001640)=""/256, 0x100}, {&(0x7f0000003640)=""/128, 0x80}, {&(0x7f00000015c0)=""/51, 0x33}, {&(0x7f00000001c0)=""/57, 0x39}], 0x8) readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r3, 0x29, 0x4, 0x0, &(0x7f0000000080)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7ffffff9) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001740)="7b901d69a1c802f83f4f16a4c458b1f2afd96ae37e9a547e157f05fa46d4dcec965bafe3c1cd14ca49648f08681fb3fe8d34cdede6872e3757aadd89ea64d9b2af756511f09d94e4b8c2cd78740f10b2a6950fe071599cf39534876a49fcfe1e530fa4f13e6fcafddee6ce8ba49b9a4c9b4666f02ad3c11beaafdebb160e636a363dfc61293f1081abbe49d2d37bd5caec77e5e8d76d175b9bf6468be3277c4bf73fca0cdb8e21355cbd3c991a437a865d32dc71d4a76cedddfaa3", 0xbb) sendmsg$BATADV_CMD_GET_DAT_CACHE(r5, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x4c, 0x0, 0x10, 0x70bd28, 0x25ffdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x6}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x100}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8f9e}]}, 0x4c}, 0x1, 0x0, 0x0, 0x2000c040}, 0x4c020) lseek(r2, 0x27b, 0x2) 19:05:41 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 8) 19:05:41 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b", 0x6a}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:05:41 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) fadvise64(r2, 0x2, 0x1ff, 0x3) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = dup2(r0, r3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') recvmsg$unix(r4, &(0x7f0000000600)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/48, 0x30}, {&(0x7f0000000200)=""/37, 0x25}, {&(0x7f0000000240)=""/170, 0xaa}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/16, 0x10}, {&(0x7f0000001e00)=""/4096, 0x1000}], 0x7, &(0x7f0000001940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x150}, 0x40000020) writev(r5, &(0x7f0000000840)=[{&(0x7f0000000640)="e7c65aa05424c23c580b252e90", 0xd}, {&(0x7f0000000680)="066bd268d5ca17b5acc3f2d99efb21e087c15fb2b64c9860fccf5ad6bb83df24fd6c3b2e0a4b26d3e33e8bc632e4a76399d95fb1ab1e", 0x36}, {&(0x7f00000006c0)="592a6963e2b1cbaa8d51b197e4afeea72b0fa05d3fc62487104735066e522ba43cfa0af7eabfdaa1841b50626a152c98ff74daeb6a09debb1f4182e74354f239bc145540b2a2b8faf95af9a42f654bc3827c073fe597b28e672e31146e73163a4b01e7882f0cf63a9ca56fcacfa9f4f82e9e99db3c5d778cbba84421b5121a7ebe49ccee39634ca8809012b2c6c74d4ef8a92e3fed6d38ea9e27e0fc834a665ce7032ef508c736459812fb61aa99c1e48eb5bd2873b73907dd374473348f6df5073828eea269b4d71776e482e831453894b192f6da864591f85879946d2600827f22c7e8af7a484ee6e7dc79802f65ab9c00", 0xf2}, {&(0x7f00000007c0)="12ce3b6ecf1b9b53c2c810ad1c2bca9739afa861dcb8773df5f840", 0x1b}, {&(0x7f0000000800)="e2b48b90bdc46367813bf179bf5976d0a3", 0x11}], 0x5) r6 = clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x6, 0x7, 0x0, 0xff, 0x0, 0x200, 0x20080, 0xc, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x214f, 0xa}, 0x2402, 0x1, 0x0, 0x8, 0x6, 0x237, 0xf801, 0x0, 0x8, 0x0, 0x100000001}, r6, 0xd, r1, 0x1) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:05:41 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0x7, 0x0, 0x0, @private2}, 0x1c) [ 1378.195188] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1378.202002] EXT4-fs (loop2): get root inode failed [ 1378.203150] EXT4-fs (loop2): mount failed 19:05:41 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x0) [ 1378.305314] FAULT_INJECTION: forcing a failure. [ 1378.305314] name failslab, interval 1, probability 0, space 0, times 0 [ 1378.307930] CPU: 1 PID: 11603 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1378.309276] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1378.310811] Call Trace: [ 1378.311341] dump_stack+0x107/0x167 [ 1378.312023] should_fail.cold+0x5/0xa [ 1378.312743] ? jbd2__journal_start+0x190/0x890 [ 1378.313586] should_failslab+0x5/0x20 [ 1378.314287] kmem_cache_alloc+0x5b/0x360 [ 1378.315045] jbd2__journal_start+0x190/0x890 [ 1378.315878] __ext4_journal_start_sb+0x214/0x430 [ 1378.316837] ext4_setattr+0xe96/0x22c0 [ 1378.317675] ? current_time+0x1e6/0x2c0 [ 1378.318437] ? igrab+0xc0/0xc0 [ 1378.319037] ? ext4_journalled_write_end+0x1240/0x1240 [ 1378.320094] notify_change+0xba2/0x1080 [ 1378.320967] ? mark_lock+0x2190/0x2df0 [ 1378.321726] do_truncate+0x134/0x1f0 [ 1378.322495] ? file_open_root+0x440/0x440 [ 1378.323409] ? security_file_open+0x20b/0x500 [ 1378.324334] ? may_open+0x1e4/0x400 [ 1378.325076] path_openat+0x1d51/0x26d0 [ 1378.325911] ? path_lookupat+0x860/0x860 [ 1378.326728] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1378.327825] ? SOFTIRQ_verbose+0x10/0x10 [ 1378.328701] ? lock_acquire+0x197/0x490 [ 1378.329517] do_filp_open+0x17e/0x3d0 [ 1378.330335] ? may_open_dev+0xf0/0xf0 [ 1378.331117] ? __alloc_fd+0x2a5/0x620 [ 1378.331968] ? rwlock_bug.part.0+0x90/0x90 [ 1378.332823] ? _raw_spin_unlock+0x1a/0x30 [ 1378.333710] ? __alloc_fd+0x2a5/0x620 [ 1378.334547] do_sys_openat2+0x171/0x420 [ 1378.335353] ? build_open_flags+0x690/0x690 [ 1378.336233] ? wait_for_completion+0x270/0x270 [ 1378.337118] ? rcu_read_lock_any_held+0x75/0xa0 [ 1378.338118] ? vfs_write+0x354/0xa30 [ 1378.338846] __x64_sys_creat+0xc9/0x120 [ 1378.339702] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 1378.340783] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1378.341794] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1378.342854] ? trace_hardirqs_on+0x5b/0x180 [ 1378.343683] do_syscall_64+0x33/0x40 [ 1378.344511] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1378.345518] RIP: 0033:0x7f8428451b19 [ 1378.346290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1378.349939] RSP: 002b:00007f84259c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1378.351542] RAX: ffffffffffffffda RBX: 00007f8428564f60 RCX: 00007f8428451b19 [ 1378.352986] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 1378.354372] RBP: 00007f84259c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 1378.355876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1378.357247] R13: 00007ffc9c2fdc9f R14: 00007f84259c7300 R15: 0000000000022000 [ 1378.358770] EXT4-fs error (device sda) in ext4_setattr:5592: Out of memory 19:05:41 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000000400", 0x1c, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:05:41 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @private2}, 0x1c) [ 1378.461732] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 1378.463021] EXT4-fs (loop2): mount failed 19:06:01 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000000400", 0x1c, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:06:01 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x2, 0x0, @private2}, 0x1c) 19:06:01 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a", 0x9f}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:06:01 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x0) 19:06:01 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 9) 19:06:01 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @private2}, 0x1c) (fail_nth: 1) 19:06:01 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x0) mknodat$null(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1, 0x103) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) linkat(r1, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x1000) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='numa_maps\x00') openat(r2, &(0x7f0000000480)='./file0/file0\x00', 0x240040, 0x22) readv(r2, &(0x7f0000003700)=[{&(0x7f0000000200)=""/216, 0xd8}, {&(0x7f00000003c0)=""/121, 0x79}, {&(0x7f0000000380)=""/51, 0x33}, {&(0x7f00000014c0)=""/160, 0xa0}, {&(0x7f0000001640)=""/256, 0x100}, {&(0x7f0000003640)=""/128, 0x80}, {&(0x7f00000015c0)=""/51, 0x33}, {&(0x7f00000001c0)=""/57, 0x39}], 0x8) readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r3, 0x29, 0x4, 0x0, &(0x7f0000000080)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7ffffff9) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001740)="7b901d69a1c802f83f4f16a4c458b1f2afd96ae37e9a547e157f05fa46d4dcec965bafe3c1cd14ca49648f08681fb3fe8d34cdede6872e3757aadd89ea64d9b2af756511f09d94e4b8c2cd78740f10b2a6950fe071599cf39534876a49fcfe1e530fa4f13e6fcafddee6ce8ba49b9a4c9b4666f02ad3c11beaafdebb160e636a363dfc61293f1081abbe49d2d37bd5caec77e5e8d76d175b9bf6468be3277c4bf73fca0cdb8e21355cbd3c991a437a865d32dc71d4a76cedddfaa3", 0xbb) sendmsg$BATADV_CMD_GET_DAT_CACHE(r5, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x4c, 0x0, 0x10, 0x70bd28, 0x25ffdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x6}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x100}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8f9e}]}, 0x4c}, 0x1, 0x0, 0x0, 0x2000c040}, 0x4c020) lseek(r2, 0x27b, 0x2) 19:06:01 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r2, &(0x7f0000000fc0)=[{{&(0x7f00000002c0)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x4004810) preadv(r2, &(0x7f0000000a80)=[{&(0x7f0000000700)=""/9, 0x9}, {&(0x7f0000000b00)=""/161, 0xa1}, {&(0x7f0000000800)=""/75, 0x4b}, {&(0x7f0000000940)=""/138, 0x8a}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000a00)=""/95, 0x5f}, {&(0x7f0000000880)=""/24, 0x18}], 0x7, 0x4, 0x1ff) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = dup2(r0, r4) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') mkdirat(r5, &(0x7f00000006c0)='./file0\x00', 0x5) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r6, &(0x7f0000000fc0)=[{{&(0x7f00000002c0)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x4004810) ftruncate(r6, 0x9) clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) pwritev2(r3, &(0x7f0000000640)=[{&(0x7f0000000080)="609dacaa897aaa35ae817868a0bdd43e55b5088f6081711dfc186267aeac7e5608a7df04956fd9f8e78359df998ca414b72c44daf1ccd3d9df94baac5d3ec358a9706195907a3b55ae77c3d5cdb160eb8339682fd914eb769bdd3c4da67860394a84277f005b91246737403d47206af0", 0x70}, {&(0x7f0000000140)="79bb6931e8bfd511f0a4cea5b935773ee573aeb5a53f17def6c44411307e0b428545d0507be21f96abc48677d29826dec1adc633e714d1488bf373efc2a0f210bb3be26a2f840cbcda39bc7dbb5efabb2159bba48925e8f87f07f415b221e91b85165ffe41b6fd9fef7e69ceac160862020fbe08fe06b1b4e1141dacb9621ee5ac9bc76c66761b633d2a807ee2c41c2b5d16ee46da7d089abaa3772e842ebbe8db45c570e5e31347e66335fad0e797b58df454f7cdca5e5ba3958245c623fcf6755dc54e2a24233b70e07ddcbfe8b8c7a52d07c6a8c922604617529fa90e87a633", 0xe1}, {&(0x7f0000000300)="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", 0xfb}, {&(0x7f0000000400)="9e3e89a5c42c0bacb3c3ff47bb3230adc52da9e156077e1ad4467bda60a2b9fadd7492a7503ec171394be241051d32eaa7ebddca84e98e125728b22052218085dfec1db23680d33d922921d72588c3dc3ca8aff2a7801e5e03aebac9273a0d20e3a4d5ce2f259e5973cf145465f683e527e941e9c7e5166195de495bc872a59b726e9be2400f1dc5f0557c51e0356056191187f15c6f8241fe91c235bb3dbd5bc514c00d12cebb322c55657625a7d9fc20d9cc46ba1a629c04ff58b5cc", 0xbd}, {&(0x7f00000004c0)="04de081c9496a45b011532e4aa7c4f5865f21819a36e7fe51203b790c6046f9e772b569de8517f1c684615237fdeee3aafde3c0b5bc2b5e5ce80232a44e9299af5ea245438356cb46d49f8a8a122e7e70378bc913f7ed083db37f1bb309777f51eab11bd293d6bb414a42e1290ed970ef2ab3ef002f3d443b7006fde377a7af838", 0x81}, {&(0x7f0000000240)="05", 0x1}, {&(0x7f0000000280)="ee17116be7f74e874c88b640", 0xc}, {&(0x7f0000000580)="25dc3b38a87d58a4bcd79c874ed0048026842906cd22a1a664b67192ace0f4e193330df52df2e0c475db6e144bde4d982a5d89ec90ea827db9d990ea6f573fdeee3d57196e844236b35694f43142081345788e50cd69c836eb95b6079906f3e151fdfc92dcf8af3d9ed6d2617414fb46509f63e651a0fe1c2f5d110e27958ce240a2dbb782d051e0bba0406f92d7a05be0293c7c6f085079", 0x98}], 0x8, 0x0, 0x6504, 0x13) connect$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 1397.755865] FAULT_INJECTION: forcing a failure. [ 1397.755865] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1397.758278] CPU: 1 PID: 11742 Comm: syz-executor.6 Not tainted 5.10.159 #1 [ 1397.759682] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1397.761350] Call Trace: [ 1397.761894] dump_stack+0x107/0x167 [ 1397.762639] should_fail.cold+0x5/0xa [ 1397.763419] _copy_from_user+0x2e/0x1b0 [ 1397.764263] move_addr_to_kernel.part.0+0x31/0x110 [ 1397.765292] __sys_connect+0xda/0x1a0 [ 1397.766200] ? __sys_connect_file+0x1a0/0x1a0 [ 1397.767306] ? ksys_write+0x19b/0x260 [ 1397.768114] ? fput_many+0x2f/0x1a0 [ 1397.768854] ? ksys_write+0x1a9/0x260 [ 1397.769641] __x64_sys_connect+0x6f/0xb0 [ 1397.770504] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1397.771574] do_syscall_64+0x33/0x40 [ 1397.772335] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1397.773481] RIP: 0033:0x7fd6e6294b19 [ 1397.774350] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1397.778149] RSP: 002b:00007fd6e380a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 1397.779705] RAX: ffffffffffffffda RBX: 00007fd6e63a7f60 RCX: 00007fd6e6294b19 [ 1397.781154] RDX: 000000000000001c RSI: 0000000020000200 RDI: 0000000000000004 [ 1397.782597] RBP: 00007fd6e380a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1397.784071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1397.785521] R13: 00007fff3747e5ef R14: 00007fd6e380a300 R15: 0000000000022000 [ 1397.842015] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 1397.843212] EXT4-fs (loop2): mount failed 19:06:01 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @private2}, 0x1c) (fail_nth: 2) 19:06:01 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x0) [ 1397.892745] FAULT_INJECTION: forcing a failure. [ 1397.892745] name failslab, interval 1, probability 0, space 0, times 0 [ 1397.894594] CPU: 0 PID: 11789 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1397.895569] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1397.897113] Call Trace: [ 1397.897499] dump_stack+0x107/0x167 [ 1397.898176] should_fail.cold+0x5/0xa [ 1397.898880] ? create_object.isra.0+0x3a/0xa20 [ 1397.899743] should_failslab+0x5/0x20 [ 1397.900448] kmem_cache_alloc+0x5b/0x360 [ 1397.901201] create_object.isra.0+0x3a/0xa20 [ 1397.901814] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1397.902739] kmem_cache_alloc+0x159/0x360 [ 1397.903333] jbd2__journal_start+0x190/0x890 [ 1397.904129] __ext4_journal_start_sb+0x214/0x430 [ 1397.904796] ext4_setattr+0xe96/0x22c0 [ 1397.905428] ? current_time+0x1e6/0x2c0 [ 1397.906151] ? igrab+0xc0/0xc0 [ 1397.906689] ? ext4_journalled_write_end+0x1240/0x1240 [ 1397.907649] notify_change+0xba2/0x1080 [ 1397.908287] ? mark_lock+0x2190/0x2df0 [ 1397.909002] do_truncate+0x134/0x1f0 [ 1397.909604] ? file_open_root+0x440/0x440 [ 1397.910361] ? security_file_open+0x20b/0x500 [ 1397.911110] ? may_open+0x1e4/0x400 [ 1397.911799] path_openat+0x1d51/0x26d0 [ 1397.912384] ? path_lookupat+0x860/0x860 [ 1397.913128] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1397.913960] ? SOFTIRQ_verbose+0x10/0x10 [ 1397.914703] ? lock_acquire+0x197/0x490 [ 1397.915364] do_filp_open+0x17e/0x3d0 [ 1397.915978] ? may_open_dev+0xf0/0xf0 [ 1397.916590] ? __alloc_fd+0x2a5/0x620 [ 1397.917157] ? rwlock_bug.part.0+0x90/0x90 [ 1397.917855] ? _raw_spin_unlock+0x1a/0x30 [ 1397.918518] ? __alloc_fd+0x2a5/0x620 [ 1397.919149] do_sys_openat2+0x171/0x420 [ 1397.919763] ? build_open_flags+0x690/0x690 [ 1397.920422] ? wait_for_completion+0x270/0x270 [ 1397.921112] ? rcu_read_lock_any_held+0x75/0xa0 [ 1397.921799] ? vfs_write+0x354/0xa30 [ 1397.922369] __x64_sys_creat+0xc9/0x120 [ 1397.922965] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 1397.923764] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1397.924561] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1397.925329] ? trace_hardirqs_on+0x5b/0x180 [ 1397.925982] do_syscall_64+0x33/0x40 [ 1397.926561] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1397.927336] RIP: 0033:0x7f8428451b19 [ 1397.927909] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1397.930683] RSP: 002b:00007f84259a6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1397.931844] RAX: ffffffffffffffda RBX: 00007f8428565020 RCX: 00007f8428451b19 [ 1397.932920] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 1397.933987] RBP: 00007f84259a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1397.935052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1397.936133] R13: 00007ffc9c2fdc9f R14: 00007f84259a6300 R15: 0000000000022000 19:06:01 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f0000000000000400", 0x1c, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:06:01 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:06:01 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 10) 19:06:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x30, 0x18, 0x1, 0x0, 0x0, {0xa}, [@nested={0x1c, 0x0, 0x0, 0x1, [@typed={0x4}, @typed={0x14, 0xf, 0x0, 0x0, @ipv6=@empty}]}]}, 0x30}}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) [ 1398.057900] FAULT_INJECTION: forcing a failure. [ 1398.057900] name failslab, interval 1, probability 0, space 0, times 0 [ 1398.059620] CPU: 0 PID: 11858 Comm: syz-executor.6 Not tainted 5.10.159 #1 [ 1398.060641] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1398.061863] Call Trace: [ 1398.062266] dump_stack+0x107/0x167 [ 1398.062813] should_fail.cold+0x5/0xa [ 1398.063378] ? __inet_hash_connect+0x843/0xee0 [ 1398.064081] should_failslab+0x5/0x20 [ 1398.064642] kmem_cache_alloc+0x5b/0x360 [ 1398.065262] __inet_hash_connect+0x843/0xee0 [ 1398.065953] ? __inet6_lookup_established+0xa90/0xa90 [ 1398.066728] ? inet_hash+0x80/0x80 [ 1398.067340] tcp_v6_connect+0x114c/0x1be0 [ 1398.067984] ? rt6_get_cookie+0x390/0x390 [ 1398.068677] __inet_stream_connect+0x816/0xd50 [ 1398.069375] ? lock_release+0x6b0/0x6b0 [ 1398.069979] ? lock_downgrade+0x6d0/0x6d0 [ 1398.070625] ? inet_init_net+0x5a0/0x5a0 [ 1398.071249] ? mark_held_locks+0x9e/0xe0 [ 1398.071901] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1398.072693] ? __local_bh_enable_ip+0x9d/0x100 [ 1398.073396] inet_stream_connect+0x53/0xa0 [ 1398.074041] ? __inet_stream_connect+0xd50/0xd50 [ 1398.074761] __sys_connect_file+0x15b/0x1a0 [ 1398.075379] __sys_connect+0x165/0x1a0 [ 1398.075992] ? __sys_connect_file+0x1a0/0x1a0 [ 1398.076677] ? vfs_write+0x354/0xa30 [ 1398.077206] ? fput_many+0x2f/0x1a0 [ 1398.077764] ? ksys_write+0x1a9/0x260 [ 1398.078360] __x64_sys_connect+0x6f/0xb0 [ 1398.078933] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1398.079716] do_syscall_64+0x33/0x40 [ 1398.080282] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1398.080997] RIP: 0033:0x7fd6e6294b19 [ 1398.081567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1398.084095] RSP: 002b:00007fd6e380a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 1398.085242] RAX: ffffffffffffffda RBX: 00007fd6e63a7f60 RCX: 00007fd6e6294b19 [ 1398.086317] RDX: 000000000000001c RSI: 0000000020000200 RDI: 0000000000000004 [ 1398.087403] RBP: 00007fd6e380a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1398.088545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1398.089607] R13: 00007fff3747e5ef R14: 00007fd6e380a300 R15: 0000000000022000 19:06:01 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a", 0x9f}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:06:01 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @private2}, 0x1c) (fail_nth: 3) [ 1398.269119] netlink: 'syz-executor.3': attribute type 15 has an invalid length. [ 1398.283773] netlink: 'syz-executor.3': attribute type 15 has an invalid length. [ 1398.321403] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 1398.322399] EXT4-fs (loop2): mount failed [ 1398.335823] FAULT_INJECTION: forcing a failure. [ 1398.335823] name failslab, interval 1, probability 0, space 0, times 0 [ 1398.338385] CPU: 1 PID: 11878 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1398.339807] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1398.341426] Call Trace: [ 1398.341966] dump_stack+0x107/0x167 [ 1398.342761] should_fail.cold+0x5/0xa [ 1398.343546] ? ext4_init_io_end+0x23/0x180 [ 1398.344583] should_failslab+0x5/0x20 [ 1398.345353] kmem_cache_alloc+0x5b/0x360 [ 1398.346175] ext4_init_io_end+0x23/0x180 [ 1398.346994] ext4_writepages+0xfd9/0x3590 [ 1398.347843] ? mark_lock+0xf5/0x2df0 [ 1398.348599] ? lock_chain_count+0x20/0x20 [ 1398.349474] ? __ext4_mark_inode_dirty+0x800/0x800 [ 1398.350478] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1398.351558] ? lock_chain_count+0x20/0x20 [ 1398.352486] ? find_held_lock+0x2c/0x110 [ 1398.353463] ? avc_has_perm_noaudit+0x1ca/0x3a0 [ 1398.354419] ? __lock_acquire+0x1657/0x5b00 [ 1398.355288] ? __ext4_mark_inode_dirty+0x800/0x800 [ 1398.356297] do_writepages+0xee/0x2a0 [ 1398.357082] ? page_writeback_cpu_online+0x20/0x20 [ 1398.358079] ? lock_chain_count+0x20/0x20 [ 1398.358919] ? __lock_acquire+0x1657/0x5b00 [ 1398.359838] filemap_fdatawrite_range+0x247/0x2f0 [ 1398.360819] ? filemap_flush+0x2e0/0x2e0 [ 1398.361644] ? lock_downgrade+0x6d0/0x6d0 [ 1398.362522] jbd2_journal_begin_ordered_truncate+0x12b/0x190 [ 1398.363713] ext4_setattr+0xce3/0x22c0 [ 1398.364505] ? current_time+0x1e6/0x2c0 [ 1398.365295] ? igrab+0xc0/0xc0 [ 1398.365963] ? ext4_journalled_write_end+0x1240/0x1240 [ 1398.367025] notify_change+0xba2/0x1080 [ 1398.367854] ? mark_lock+0x2190/0x2df0 [ 1398.368653] do_truncate+0x134/0x1f0 [ 1398.369408] ? file_open_root+0x440/0x440 [ 1398.370251] ? security_file_open+0x20b/0x500 [ 1398.371183] ? may_open+0x1e4/0x400 [ 1398.371943] path_openat+0x1d51/0x26d0 [ 1398.372754] ? path_lookupat+0x860/0x860 [ 1398.373562] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1398.374626] ? SOFTIRQ_verbose+0x10/0x10 [ 1398.375450] ? lock_acquire+0x197/0x490 [ 1398.376290] do_filp_open+0x17e/0x3d0 [ 1398.377063] ? may_open_dev+0xf0/0xf0 [ 1398.377847] ? __alloc_fd+0x2a5/0x620 [ 1398.378633] ? rwlock_bug.part.0+0x90/0x90 [ 1398.379508] ? _raw_spin_unlock+0x1a/0x30 [ 1398.380361] ? __alloc_fd+0x2a5/0x620 [ 1398.381161] do_sys_openat2+0x171/0x420 [ 1398.381936] ? build_open_flags+0x690/0x690 [ 1398.382814] ? wait_for_completion+0x270/0x270 [ 1398.383784] ? rcu_read_lock_any_held+0x75/0xa0 [ 1398.384742] ? vfs_write+0x354/0xa30 [ 1398.385503] __x64_sys_creat+0xc9/0x120 [ 1398.386287] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 1398.387294] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1398.388355] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1398.389388] ? trace_hardirqs_on+0x5b/0x180 [ 1398.390343] do_syscall_64+0x33/0x40 [ 1398.391135] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1398.392278] RIP: 0033:0x7f8428451b19 [ 1398.393132] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1398.397173] RSP: 002b:00007f84259a6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1398.398858] RAX: ffffffffffffffda RBX: 00007f8428565020 RCX: 00007f8428451b19 [ 1398.400496] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 1398.402094] RBP: 00007f84259a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1398.403670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1398.405484] R13: 00007ffc9c2fdc9f R14: 00007f84259a6300 R15: 0000000000022000 19:06:01 executing program 3: fadvise64(0xffffffffffffffff, 0x20000000000000, 0x3, 0x1) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4400, 0x100) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000380)={0x1, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @broadcast}}}, 0x108) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1398.447491] FAULT_INJECTION: forcing a failure. [ 1398.447491] name failslab, interval 1, probability 0, space 0, times 0 [ 1398.449908] CPU: 1 PID: 11892 Comm: syz-executor.6 Not tainted 5.10.159 #1 [ 1398.451423] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1398.453183] Call Trace: [ 1398.453761] dump_stack+0x107/0x167 [ 1398.454541] should_fail.cold+0x5/0xa [ 1398.455327] ? create_object.isra.0+0x3a/0xa20 [ 1398.456414] should_failslab+0x5/0x20 [ 1398.457193] kmem_cache_alloc+0x5b/0x360 [ 1398.458022] ? lock_release+0x6b0/0x6b0 [ 1398.458885] create_object.isra.0+0x3a/0xa20 [ 1398.459807] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1398.460850] kmem_cache_alloc+0x159/0x360 [ 1398.461698] __inet_hash_connect+0x843/0xee0 [ 1398.462690] ? __inet6_lookup_established+0xa90/0xa90 [ 1398.463780] ? inet_hash+0x80/0x80 [ 1398.464532] tcp_v6_connect+0x114c/0x1be0 [ 1398.465449] ? rt6_get_cookie+0x390/0x390 [ 1398.466357] __inet_stream_connect+0x816/0xd50 [ 1398.467293] ? lock_release+0x6b0/0x6b0 [ 1398.468128] ? lock_downgrade+0x6d0/0x6d0 [ 1398.469026] ? inet_init_net+0x5a0/0x5a0 [ 1398.469841] ? mark_held_locks+0x9e/0xe0 [ 1398.470704] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1398.471884] ? __local_bh_enable_ip+0x9d/0x100 [ 1398.472813] inet_stream_connect+0x53/0xa0 [ 1398.473678] ? __inet_stream_connect+0xd50/0xd50 [ 1398.474628] __sys_connect_file+0x15b/0x1a0 [ 1398.475504] __sys_connect+0x165/0x1a0 [ 1398.476310] ? __sys_connect_file+0x1a0/0x1a0 [ 1398.477215] ? vfs_write+0x354/0xa30 [ 1398.477974] ? fput_many+0x2f/0x1a0 [ 1398.478709] ? ksys_write+0x1a9/0x260 [ 1398.479501] __x64_sys_connect+0x6f/0xb0 [ 1398.480337] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1398.481393] do_syscall_64+0x33/0x40 [ 1398.482152] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1398.483186] RIP: 0033:0x7fd6e6294b19 [ 1398.483966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1398.487661] RSP: 002b:00007fd6e380a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 1398.489194] RAX: ffffffffffffffda RBX: 00007fd6e63a7f60 RCX: 00007fd6e6294b19 [ 1398.490636] RDX: 000000000000001c RSI: 0000000020000200 RDI: 0000000000000004 [ 1398.492109] RBP: 00007fd6e380a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1398.493545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1398.494979] R13: 00007fff3747e5ef R14: 00007fd6e380a300 R15: 0000000000022000 19:06:16 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @private2}, 0x1c) 19:06:16 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 11) 19:06:16 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xff}, 0x0, 0x0, 0x0, 0x4, 0x400000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0xffffffffffffffff, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:06:16 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x3, 0x0, @private2}, 0x1c) 19:06:16 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:06:16 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 1) 19:06:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a", 0x9f}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:06:16 executing program 3: fadvise64(0xffffffffffffffff, 0x20000000000000, 0x3, 0x1) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4400, 0x100) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000380)={0x1, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @broadcast}}}, 0x108) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1413.193724] FAULT_INJECTION: forcing a failure. [ 1413.193724] name failslab, interval 1, probability 0, space 0, times 0 [ 1413.196223] CPU: 0 PID: 12002 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1413.197599] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1413.199232] Call Trace: [ 1413.199799] dump_stack+0x107/0x167 [ 1413.200526] should_fail.cold+0x5/0xa [ 1413.201283] ? getname_flags.part.0+0x50/0x4f0 [ 1413.202186] should_failslab+0x5/0x20 [ 1413.202940] kmem_cache_alloc+0x5b/0x360 [ 1413.203763] getname_flags.part.0+0x50/0x4f0 [ 1413.204648] ? wait_for_completion+0x270/0x270 [ 1413.205572] getname_flags+0x9a/0xe0 [ 1413.206314] do_mkdirat+0x8d/0x2a0 [ 1413.207019] ? user_path_create+0xf0/0xf0 [ 1413.207891] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1413.208946] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1413.210012] do_syscall_64+0x33/0x40 [ 1413.210738] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1413.211820] RIP: 0033:0x7fae7cd32b19 [ 1413.212582] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1413.216523] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1413.218478] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1413.220348] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1413.222194] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1413.224070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1413.225936] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 [ 1413.254552] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1413.260655] FAULT_INJECTION: forcing a failure. [ 1413.260655] name failslab, interval 1, probability 0, space 0, times 0 [ 1413.263192] CPU: 1 PID: 12003 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1413.264631] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1413.266332] Call Trace: [ 1413.266883] dump_stack+0x107/0x167 [ 1413.267642] should_fail.cold+0x5/0xa [ 1413.268495] ? jbd2__journal_start+0x190/0x890 [ 1413.269501] should_failslab+0x5/0x20 [ 1413.270403] kmem_cache_alloc+0x5b/0x360 [ 1413.271338] jbd2__journal_start+0x190/0x890 [ 1413.272263] __ext4_journal_start_sb+0x214/0x430 [ 1413.273241] ext4_truncate+0x665/0x12b0 [ 1413.274074] ? ext4_punch_hole+0x1110/0x1110 [ 1413.274999] ext4_setattr+0x14c7/0x22c0 [ 1413.275825] ? current_time+0x1e6/0x2c0 [ 1413.276666] ? ext4_journalled_write_end+0x1240/0x1240 [ 1413.277743] notify_change+0xba2/0x1080 [ 1413.278561] ? mark_lock+0x2190/0x2df0 [ 1413.279379] do_truncate+0x134/0x1f0 [ 1413.280156] ? file_open_root+0x440/0x440 [ 1413.281012] ? security_file_open+0x20b/0x500 [ 1413.281954] ? may_open+0x1e4/0x400 [ 1413.282715] path_openat+0x1d51/0x26d0 [ 1413.283533] ? path_lookupat+0x860/0x860 [ 1413.284373] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1413.285447] ? SOFTIRQ_verbose+0x10/0x10 [ 1413.286353] ? lock_acquire+0x197/0x490 [ 1413.287329] do_filp_open+0x17e/0x3d0 [ 1413.288261] ? may_open_dev+0xf0/0xf0 [ 1413.289177] ? __alloc_fd+0x2a5/0x620 [ 1413.290102] ? rwlock_bug.part.0+0x90/0x90 [ 1413.291127] ? _raw_spin_unlock+0x1a/0x30 [ 1413.292123] ? __alloc_fd+0x2a5/0x620 [ 1413.293053] do_sys_openat2+0x171/0x420 [ 1413.294004] ? build_open_flags+0x690/0x690 [ 1413.295035] ? wait_for_completion+0x270/0x270 [ 1413.296146] ? rcu_read_lock_any_held+0x75/0xa0 [ 1413.297252] ? vfs_write+0x354/0xa30 [ 1413.298155] __x64_sys_creat+0xc9/0x120 [ 1413.299107] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 1413.300317] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1413.301571] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1413.302797] ? trace_hardirqs_on+0x5b/0x180 [ 1413.303836] do_syscall_64+0x33/0x40 [ 1413.304726] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1413.305946] RIP: 0033:0x7f8428451b19 [ 1413.306834] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1413.311228] RSP: 002b:00007f84259c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1413.313050] RAX: ffffffffffffffda RBX: 00007f8428564f60 RCX: 00007f8428451b19 [ 1413.314745] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 1413.316467] RBP: 00007f84259c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 1413.318168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1413.319871] R13: 00007ffc9c2fdc9f R14: 00007f84259c7300 R15: 0000000000022000 [ 1413.322211] EXT4-fs (loop2): get root inode failed [ 1413.323400] EXT4-fs (loop2): mount failed [ 1413.337170] EXT4-fs error (device sda) in ext4_setattr:5592: Out of memory 19:06:16 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1a) getpgrp(0xffffffffffffffff) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) recvmsg$unix(r1, &(0x7f0000000700)={&(0x7f0000000540)=@abs, 0x6e, &(0x7f0000000600)=[{&(0x7f00000005c0)=""/48, 0x30}], 0x1, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb0}, 0x0) ptrace(0x4208, r2) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x200, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="921851000000000000000007000000000000009abdd94697df247efaf104566262b85a450bcb02933b000000005611c5581ba6fe8e8b559503088ffb08070000eef80da43b3883cc907c814450b61edcf5b5c318ffe36aa6ee1aa18ce3b5e9d8e5626e7cc3a6f799002d3373e155d195c01b8b7b9401a4edae5e2419b5a00057db5144a72b9ec13b3d1398df8bd5"]) io_setup(0x5, &(0x7f0000000080)) io_submit(0x0, 0x2, &(0x7f0000000800)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x2, 0x9ca, r4, &(0x7f0000000440)="192dcedf2f9f5cd7f3876a872ec04ee53c1133f06fdf2f86ec006f771ad848aed561437a3bf8dca8848578f11a17a69cbf94c044c0a13654eaba6fed6479f5579a1062241ab7a6029ac6700bdaa781ebb0f0c5a1d252366f5a292d19ba6b2390b7a77250fb724fde987376fbf6103c508877efaabc21343f406bd4d6668d2d2040cffe51ea28cc551052e36b79ae", 0x8e, 0x100000001, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x3, 0x8f8f, r0, &(0x7f0000000740)="adde2c8628b9bb40910b1f839999f856d666fe324884ad5091b1f9ace9363e52f64ef219db63fef9de105151c5cf9d35b01f5c3d0efa9b72d93447131a081373f17b7b69de39c99679c6dd0d6c4570923aec162da5399ca98d25f119c9b4dead75a72b5a32281f0ae21201a0ca42587b2ba61fc1768caf0668a78ceb79562b98ff5cee36dbae0045cc835926686480519ca81dba52e474aef3", 0x99, 0x58, 0x0, 0x0, r5}]) r6 = syz_io_uring_setup(0x3de4, &(0x7f0000000080)={0x0, 0x2b53, 0x4, 0x0, 0x0, 0x0, r1}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000380), &(0x7f0000002a40)) io_uring_enter(r6, 0x76d3, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(r6, 0x2, &(0x7f0000000240)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto(r7, &(0x7f0000000280)="f8b7d71ac5bf36d1c85c16d2edc4a8bc225a3a1a221f098aba7db61dd4128049b019a54b7e2036cb788ce0d263725f8424ce5f6e505bbc3f00f490555ee097e7b23c14e94aae610270f6eeb9cca9f2bf88923cd5b4dcee99dc5ed7b4841956ca0bb382be3a0e972335d6a8fb69e086e4d651995e314c8bd8745c2c944faec7406fc256b6d7649352bc02c59541ea83c604f3331f9a12987490b98015b79f6016fadf8fccb6b50c9bdc486639c6d336559347910faa2e116ba51665652646f4df2741110c429cfd1db3e62636322c174c", 0xd0, 0x20040080, &(0x7f00000001c0)=@rc={0x1f, @none, 0x9}, 0x80) 19:06:16 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 2) 19:06:16 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 12) 19:06:16 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:06:16 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r2, &(0x7f0000000fc0)=[{{&(0x7f00000002c0)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x4004810) readv(r2, &(0x7f0000000180)=[{&(0x7f0000000080)=""/68, 0x44}, {&(0x7f0000000140)=""/46, 0x2e}, {&(0x7f0000000940)=""/4096, 0x1000}], 0x3) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f00000001c0)='./file0\x00', 0x100) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:06:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499", 0xb9}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) [ 1413.616306] FAULT_INJECTION: forcing a failure. [ 1413.616306] name failslab, interval 1, probability 0, space 0, times 0 [ 1413.618481] CPU: 0 PID: 12118 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1413.619714] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1413.621191] Call Trace: [ 1413.621660] dump_stack+0x107/0x167 [ 1413.622297] should_fail.cold+0x5/0xa [ 1413.623056] ? create_object.isra.0+0x3a/0xa20 [ 1413.623867] should_failslab+0x5/0x20 [ 1413.624537] kmem_cache_alloc+0x5b/0x360 [ 1413.625243] ? ksys_write+0x21a/0x260 [ 1413.625923] create_object.isra.0+0x3a/0xa20 [ 1413.626694] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1413.627624] kmem_cache_alloc+0x159/0x360 [ 1413.628359] getname_flags.part.0+0x50/0x4f0 [ 1413.629132] ? wait_for_completion+0x270/0x270 [ 1413.629951] getname_flags+0x9a/0xe0 [ 1413.630609] do_mkdirat+0x8d/0x2a0 [ 1413.631245] ? user_path_create+0xf0/0xf0 [ 1413.632011] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1413.632938] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1413.633838] do_syscall_64+0x33/0x40 [ 1413.634490] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1413.635389] RIP: 0033:0x7fae7cd32b19 [ 1413.636053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1413.639270] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1413.640603] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1413.641835] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1413.643094] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1413.644345] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1413.645586] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 19:06:17 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 3) [ 1413.756483] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1413.787568] EXT4-fs (loop2): get root inode failed [ 1413.789127] EXT4-fs (loop2): mount failed [ 1413.795385] FAULT_INJECTION: forcing a failure. [ 1413.795385] name failslab, interval 1, probability 0, space 0, times 0 [ 1413.798442] CPU: 1 PID: 12128 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1413.800250] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1413.802335] Call Trace: [ 1413.803056] dump_stack+0x107/0x167 [ 1413.804041] should_fail.cold+0x5/0xa [ 1413.805033] ? create_object.isra.0+0x3a/0xa20 [ 1413.806200] should_failslab+0x5/0x20 [ 1413.807198] kmem_cache_alloc+0x5b/0x360 [ 1413.808298] create_object.isra.0+0x3a/0xa20 [ 1413.809432] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1413.810755] kmem_cache_alloc+0x159/0x360 [ 1413.811885] jbd2__journal_start+0x190/0x890 [ 1413.813045] __ext4_journal_start_sb+0x214/0x430 [ 1413.814300] ext4_truncate+0x665/0x12b0 [ 1413.815370] ? ext4_punch_hole+0x1110/0x1110 [ 1413.816563] ext4_setattr+0x14c7/0x22c0 [ 1413.817618] ? current_time+0x1e6/0x2c0 [ 1413.818740] ? ext4_journalled_write_end+0x1240/0x1240 [ 1413.820196] notify_change+0xba2/0x1080 [ 1413.821228] ? mark_lock+0x2190/0x2df0 [ 1413.822248] do_truncate+0x134/0x1f0 [ 1413.823199] ? file_open_root+0x440/0x440 [ 1413.824176] ? security_file_open+0x20b/0x500 [ 1413.825109] ? may_open+0x1e4/0x400 [ 1413.825853] path_openat+0x1d51/0x26d0 [ 1413.826662] ? path_lookupat+0x860/0x860 [ 1413.827482] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1413.828549] ? SOFTIRQ_verbose+0x10/0x10 [ 1413.829369] ? lock_acquire+0x197/0x490 [ 1413.830194] do_filp_open+0x17e/0x3d0 [ 1413.830961] ? may_open_dev+0xf0/0xf0 [ 1413.831732] ? __alloc_fd+0x2a5/0x620 [ 1413.832540] ? rwlock_bug.part.0+0x90/0x90 [ 1413.833412] ? _raw_spin_unlock+0x1a/0x30 [ 1413.834244] ? __alloc_fd+0x2a5/0x620 [ 1413.835028] do_sys_openat2+0x171/0x420 [ 1413.835850] ? build_open_flags+0x690/0x690 [ 1413.836725] ? wait_for_completion+0x270/0x270 [ 1413.837661] ? rcu_read_lock_any_held+0x75/0xa0 [ 1413.838682] ? vfs_write+0x354/0xa30 [ 1413.839507] __x64_sys_creat+0xc9/0x120 [ 1413.840335] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 1413.841354] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1413.842426] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1413.843465] ? trace_hardirqs_on+0x5b/0x180 [ 1413.844362] do_syscall_64+0x33/0x40 [ 1413.845120] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1413.846165] RIP: 0033:0x7f8428451b19 [ 1413.846928] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1413.850705] RSP: 002b:00007f84259c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1413.852269] RAX: ffffffffffffffda RBX: 00007f8428564f60 RCX: 00007f8428451b19 [ 1413.853707] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 1413.855166] RBP: 00007f84259c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 1413.856631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1413.858070] R13: 00007ffc9c2fdc9f R14: 00007f84259c7300 R15: 0000000000022000 19:06:17 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) [ 1414.072114] FAULT_INJECTION: forcing a failure. [ 1414.072114] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1414.075140] CPU: 0 PID: 12238 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1414.076627] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1414.078306] Call Trace: [ 1414.078859] dump_stack+0x107/0x167 [ 1414.079607] should_fail.cold+0x5/0xa [ 1414.080425] strncpy_from_user+0x34/0x470 [ 1414.081288] getname_flags.part.0+0x95/0x4f0 [ 1414.082193] ? wait_for_completion+0x270/0x270 [ 1414.083136] getname_flags+0x9a/0xe0 [ 1414.083905] do_mkdirat+0x8d/0x2a0 [ 1414.084637] ? user_path_create+0xf0/0xf0 [ 1414.085501] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1414.086585] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1414.087643] do_syscall_64+0x33/0x40 [ 1414.088426] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1414.089462] RIP: 0033:0x7fae7cd32b19 [ 1414.090220] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1414.093949] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1414.095500] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1414.096964] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1414.098409] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1414.099871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1414.101312] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 [ 1414.190269] EXT4-fs error (device loop2): ext4_fill_super:4973: inode #2: comm syz-executor.2: iget: root inode unallocated [ 1414.194586] EXT4-fs (loop2): get root inode failed [ 1414.195655] EXT4-fs (loop2): mount failed 19:06:32 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 13) 19:06:32 executing program 3: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1a) getpgrp(0xffffffffffffffff) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) recvmsg$unix(r1, &(0x7f0000000700)={&(0x7f0000000540)=@abs, 0x6e, &(0x7f0000000600)=[{&(0x7f00000005c0)=""/48, 0x30}], 0x1, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb0}, 0x0) ptrace(0x4208, r2) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x200, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="921851000000000000000007000000000000009abdd94697df247efaf104566262b85a450bcb02933b000000005611c5581ba6fe8e8b559503088ffb08070000eef80da43b3883cc907c814450b61edcf5b5c318ffe36aa6ee1aa18ce3b5e9d8e5626e7cc3a6f799002d3373e155d195c01b8b7b9401a4edae5e2419b5a00057db5144a72b9ec13b3d1398df8bd5"]) io_setup(0x5, &(0x7f0000000080)) io_submit(0x0, 0x2, &(0x7f0000000800)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x2, 0x9ca, r4, &(0x7f0000000440)="192dcedf2f9f5cd7f3876a872ec04ee53c1133f06fdf2f86ec006f771ad848aed561437a3bf8dca8848578f11a17a69cbf94c044c0a13654eaba6fed6479f5579a1062241ab7a6029ac6700bdaa781ebb0f0c5a1d252366f5a292d19ba6b2390b7a77250fb724fde987376fbf6103c508877efaabc21343f406bd4d6668d2d2040cffe51ea28cc551052e36b79ae", 0x8e, 0x100000001, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x3, 0x8f8f, r0, &(0x7f0000000740)="adde2c8628b9bb40910b1f839999f856d666fe324884ad5091b1f9ace9363e52f64ef219db63fef9de105151c5cf9d35b01f5c3d0efa9b72d93447131a081373f17b7b69de39c99679c6dd0d6c4570923aec162da5399ca98d25f119c9b4dead75a72b5a32281f0ae21201a0ca42587b2ba61fc1768caf0668a78ceb79562b98ff5cee36dbae0045cc835926686480519ca81dba52e474aef3", 0x99, 0x58, 0x0, 0x0, r5}]) r6 = syz_io_uring_setup(0x3de4, &(0x7f0000000080)={0x0, 0x2b53, 0x4, 0x0, 0x0, 0x0, r1}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000380), &(0x7f0000002a40)) io_uring_enter(r6, 0x76d3, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(r6, 0x2, &(0x7f0000000240)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendto(r7, &(0x7f0000000280)="f8b7d71ac5bf36d1c85c16d2edc4a8bc225a3a1a221f098aba7db61dd4128049b019a54b7e2036cb788ce0d263725f8424ce5f6e505bbc3f00f490555ee097e7b23c14e94aae610270f6eeb9cca9f2bf88923cd5b4dcee99dc5ed7b4841956ca0bb382be3a0e972335d6a8fb69e086e4d651995e314c8bd8745c2c944faec7406fc256b6d7649352bc02c59541ea83c604f3331f9a12987490b98015b79f6016fadf8fccb6b50c9bdc486639c6d336559347910faa2e116ba51665652646f4df2741110c429cfd1db3e62636322c174c", 0xd0, 0x20040080, &(0x7f00000001c0)=@rc={0x1f, @none, 0x9}, 0x80) 19:06:32 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000f256bcd97d4240ebf0300a003ec517b121b66ceaf65946de73018975a28a3770f47c701d70504000000000000006b86cfba5e16d772d269221414b9da9406ad12e2e4717e7103e052a894962ae411ca375d3c2549f4fb0d5654fc9e641f5dd20803928b69bd2138eb5d09fabdc96bc3cb22ad151e1ee50a0c03b4c1688e830a1d552f5590a74a6699f38857a60f94f8a36f1a8a7da7a6d6b174e55a559ebf302fa04f7096fbd8f401ba8c78978d97cd20f63b6d348978bca796f852b942873fab9777682e5e914b6c9eaf345dc93178f3f2dd287b89820000000000000000000000ec00001c9e746babb574b1fa04abe51dd4000320ee5c3b4c871dd965c387dd3ab0c12e7af8ce58c8a277f3acd07a96195163b040e7ef0ed30ab6abeaebb9086af9d225f218f31179e4b984391e7538b4ee3c886f3ff0581f8ce0ce3bfff615000000000000000000"]) 19:06:32 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0x2, 0x0, 0x0, @private2}, 0x1c) 19:06:32 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4, 0x0, @private2}, 0x1c) 19:06:32 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 4) 19:06:32 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499", 0xb9}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:06:32 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x6f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x22097, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_bp={&(0x7f0000000380), 0x6}, 0x40306, 0x0, 0x1, 0x0, 0x2, 0x0, 0x9, 0x0, 0x80000001}, 0x0, 0x1, r1, 0x3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) io_setup(0x5, &(0x7f0000000080)=0x0) io_submit(r6, 0x1, &(0x7f00000008c0)=[&(0x7f0000000200)={0x0, 0x0, 0x5, 0x1, 0x0, r5, &(0x7f0000000140)="ee", 0x1, 0x800000}]) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r9, r8, 0x0, 0x7ffffff9) io_submit(r6, 0x2, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x8, r7, &(0x7f0000000140)="78ee4a98c8b1fefaaa66bfaba830a6b7a978a9714c62f538eb9ba631306b7cf4bc08ee693cd9b9f702eb2f9744a9dd9f76d2bda40b740b626c89c7437982011e5c61f6c493db0889abaf40bcf7e94c72f4b836cf656e26ce208cf36fe45eb379d3a7199e87a4297d", 0x68, 0x10001, 0x0, 0x2, r8}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x7, 0x40, r0, &(0x7f00000001c0)="037f6a3e904d3b677e32870e4311d43c6eb968d7f87bd18c17570b604119c02f7e020aee146108a28cc7cb714f81165e7202552e4fe0ea846c6d21b06122fe195e377c77d221e4b9425c", 0x4a, 0xb041, 0x0, 0x2, r2}]) accept(0xffffffffffffffff, &(0x7f00000002c0)=@isdn, &(0x7f0000000340)=0x80) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 1429.384200] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1429.386363] EXT4-fs (loop2): group descriptors corrupted! [ 1429.393833] FAULT_INJECTION: forcing a failure. [ 1429.393833] name failslab, interval 1, probability 0, space 0, times 0 [ 1429.397336] CPU: 1 PID: 12264 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1429.398852] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1429.400640] Call Trace: [ 1429.401216] dump_stack+0x107/0x167 [ 1429.402005] should_fail.cold+0x5/0xa [ 1429.402826] ? __d_alloc+0x2a/0x990 [ 1429.403613] should_failslab+0x5/0x20 [ 1429.404458] kmem_cache_alloc+0x5b/0x360 [ 1429.405328] ? __d_lookup+0x3e8/0x710 [ 1429.406151] __d_alloc+0x2a/0x990 [ 1429.406905] d_alloc+0x46/0x1c0 [ 1429.407623] __lookup_hash+0xcc/0x190 [ 1429.408460] filename_create+0x186/0x4a0 [ 1429.409361] ? filename_parentat+0x560/0x560 [ 1429.410316] ? getname_flags.part.0+0x1dd/0x4f0 [ 1429.411338] do_mkdirat+0xa0/0x2a0 [ 1429.412117] ? user_path_create+0xf0/0xf0 [ 1429.413013] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1429.414139] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1429.415247] do_syscall_64+0x33/0x40 [ 1429.416065] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1429.417165] RIP: 0033:0x7fae7cd32b19 [ 1429.417968] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1429.421895] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1429.423521] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1429.425050] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1429.426793] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1429.428339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1429.429868] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 [ 1429.445823] FAULT_INJECTION: forcing a failure. [ 1429.445823] name failslab, interval 1, probability 0, space 0, times 0 [ 1429.447415] CPU: 0 PID: 12274 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1429.448159] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1429.449066] Call Trace: [ 1429.449353] dump_stack+0x107/0x167 [ 1429.449747] should_fail.cold+0x5/0xa [ 1429.450156] ? create_object.isra.0+0x3a/0xa20 [ 1429.450642] should_failslab+0x5/0x20 [ 1429.451049] kmem_cache_alloc+0x5b/0x360 [ 1429.451478] ? jbd2_journal_forget+0x3f9/0x690 [ 1429.451968] create_object.isra.0+0x3a/0xa20 [ 1429.452433] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1429.452970] kmem_cache_alloc+0x159/0x360 [ 1429.453413] ? jbd2_journal_put_journal_head+0x3f2/0x560 [ 1429.453991] insert_revoke_hash+0x28/0x270 [ 1429.454442] jbd2_journal_revoke+0x2bb/0x570 [ 1429.454909] __ext4_forget+0x218/0x480 [ 1429.455335] ext4_free_blocks+0x1943/0x20f0 [ 1429.455810] ? ext4_mb_new_blocks+0x4890/0x4890 [ 1429.456328] ? ext4_free_data+0x27e/0x390 [ 1429.456779] ? __ext4_journal_ensure_credits+0x263/0x2e0 [ 1429.457370] ? ext4_ind_truncate_ensure_credits+0x57f/0x780 [ 1429.457989] ext4_free_branches+0x2fc/0x680 [ 1429.458464] ext4_free_branches+0x42e/0x680 [ 1429.458932] ? ext4_free_data+0x18d/0x390 [ 1429.459401] ext4_ind_truncate+0x692/0x900 [ 1429.459860] ? ext4_ind_trans_blocks+0x80/0x80 [ 1429.460377] ? ext4_mb_mark_bb+0xd50/0xd50 [ 1429.460842] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1429.461380] ? __ext4_journal_start_sb+0x214/0x430 [ 1429.461908] ? __ext4_journal_start_sb+0x1db/0x430 [ 1429.462447] ext4_truncate+0x7b8/0x12b0 [ 1429.462878] ? ext4_punch_hole+0x1110/0x1110 [ 1429.463375] ext4_setattr+0x14c7/0x22c0 [ 1429.463809] ? current_time+0x1e6/0x2c0 [ 1429.464264] ? ext4_journalled_write_end+0x1240/0x1240 [ 1429.464833] notify_change+0xba2/0x1080 [ 1429.465269] ? mark_lock+0x2190/0x2df0 [ 1429.465695] do_truncate+0x134/0x1f0 [ 1429.466109] ? file_open_root+0x440/0x440 [ 1429.466560] ? security_file_open+0x20b/0x500 [ 1429.467065] ? may_open+0x1e4/0x400 [ 1429.467460] path_openat+0x1d51/0x26d0 [ 1429.467896] ? path_lookupat+0x860/0x860 [ 1429.468348] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1429.468919] ? SOFTIRQ_verbose+0x10/0x10 [ 1429.469357] ? lock_acquire+0x197/0x490 [ 1429.469794] do_filp_open+0x17e/0x3d0 [ 1429.470204] ? may_open_dev+0xf0/0xf0 [ 1429.470620] ? __alloc_fd+0x2a5/0x620 [ 1429.471042] ? rwlock_bug.part.0+0x90/0x90 [ 1429.471517] ? _raw_spin_unlock+0x1a/0x30 [ 1429.471978] ? __alloc_fd+0x2a5/0x620 [ 1429.472400] do_sys_openat2+0x171/0x420 [ 1429.472831] ? build_open_flags+0x690/0x690 [ 1429.473302] ? wait_for_completion+0x270/0x270 [ 1429.473789] ? rcu_read_lock_any_held+0x75/0xa0 [ 1429.474299] ? vfs_write+0x354/0xa30 [ 1429.474703] __x64_sys_creat+0xc9/0x120 [ 1429.475143] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 1429.475673] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1429.476254] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1429.476801] ? trace_hardirqs_on+0x5b/0x180 [ 1429.477278] do_syscall_64+0x33/0x40 [ 1429.477685] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1429.478244] RIP: 0033:0x7f8428451b19 [ 1429.478638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1429.480620] RSP: 002b:00007f84259a6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1429.481423] RAX: ffffffffffffffda RBX: 00007f8428565020 RCX: 00007f8428451b19 [ 1429.482198] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 1429.482967] RBP: 00007f84259a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1429.483733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1429.484517] R13: 00007ffc9c2fdc9f R14: 00007f84259a6300 R15: 0000000000022000 19:06:32 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499", 0xb9}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:06:33 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0x3, 0x0, 0x0, @private2}, 0x1c) 19:06:33 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:06:33 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 5) 19:06:33 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 14) 19:06:33 executing program 3: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000d5000f", 0xf, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) [ 1429.770029] EXT4-fs error (device loop3): ext4_fill_super:4973: inode #2: comm syz-executor.3: iget: root inode unallocated [ 1429.800789] EXT4-fs (loop3): get root inode failed [ 1429.802079] EXT4-fs (loop3): mount failed 19:06:33 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0x7, 0x0, 0x0, @private2}, 0x1c) [ 1429.833246] FAULT_INJECTION: forcing a failure. [ 1429.833246] name failslab, interval 1, probability 0, space 0, times 0 [ 1429.836100] CPU: 0 PID: 12305 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1429.837608] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1429.839427] Call Trace: [ 1429.840032] dump_stack+0x107/0x167 [ 1429.840841] should_fail.cold+0x5/0xa [ 1429.841693] ? create_object.isra.0+0x3a/0xa20 [ 1429.842703] should_failslab+0x5/0x20 [ 1429.843552] kmem_cache_alloc+0x5b/0x360 [ 1429.844490] create_object.isra.0+0x3a/0xa20 [ 1429.845466] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1429.846589] kmem_cache_alloc+0x159/0x360 [ 1429.847510] __d_alloc+0x2a/0x990 [ 1429.848291] d_alloc+0x46/0x1c0 [ 1429.849026] __lookup_hash+0xcc/0x190 [ 1429.849867] filename_create+0x186/0x4a0 [ 1429.850756] ? filename_parentat+0x560/0x560 [ 1429.851723] ? getname_flags.part.0+0x1dd/0x4f0 [ 1429.852768] do_mkdirat+0xa0/0x2a0 [ 1429.853547] ? user_path_create+0xf0/0xf0 [ 1429.854459] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1429.855600] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1429.856740] do_syscall_64+0x33/0x40 [ 1429.857584] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1429.858705] RIP: 0033:0x7fae7cd32b19 [ 1429.859528] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1429.863619] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1429.865291] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1429.866853] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1429.868418] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1429.869975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1429.871531] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 [ 1429.874096] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1429.876169] EXT4-fs (loop2): group descriptors corrupted! [ 1430.073129] FAULT_INJECTION: forcing a failure. [ 1430.073129] name failslab, interval 1, probability 0, space 0, times 0 [ 1430.075760] CPU: 0 PID: 12383 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1430.077292] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1430.079095] Call Trace: [ 1430.079678] dump_stack+0x107/0x167 [ 1430.080497] should_fail.cold+0x5/0xa [ 1430.081337] ? create_object.isra.0+0x3a/0xa20 [ 1430.082345] should_failslab+0x5/0x20 [ 1430.083176] kmem_cache_alloc+0x5b/0x360 [ 1430.084068] ? pagecache_get_page+0x243/0xc80 [ 1430.085054] create_object.isra.0+0x3a/0xa20 [ 1430.086014] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1430.087121] kmem_cache_alloc+0x159/0x360 [ 1430.088056] ext4_free_blocks+0x915/0x20f0 [ 1430.089001] ? ext4_mb_new_blocks+0x4890/0x4890 [ 1430.090016] ? ext4_free_data+0x27e/0x390 [ 1430.090935] ? ext4_ind_truncate_ensure_credits+0x57f/0x780 [ 1430.092190] ext4_free_branches+0x2fc/0x680 [ 1430.093144] ext4_free_branches+0x42e/0x680 [ 1430.094086] ? ext4_free_data+0x18d/0x390 [ 1430.095006] ext4_ind_truncate+0x692/0x900 [ 1430.095942] ? ext4_ind_trans_blocks+0x80/0x80 [ 1430.096951] ? ext4_mb_mark_bb+0xd50/0xd50 [ 1430.097897] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1430.098995] ? __ext4_journal_start_sb+0x214/0x430 [ 1430.100081] ? __ext4_journal_start_sb+0x1db/0x430 [ 1430.101159] ext4_truncate+0x7b8/0x12b0 [ 1430.102033] ? ext4_punch_hole+0x1110/0x1110 [ 1430.103016] ext4_setattr+0x14c7/0x22c0 [ 1430.103879] ? current_time+0x1e6/0x2c0 [ 1430.104771] ? ext4_journalled_write_end+0x1240/0x1240 [ 1430.105912] notify_change+0xba2/0x1080 [ 1430.106792] do_truncate+0x134/0x1f0 [ 1430.107603] ? file_open_root+0x440/0x440 [ 1430.108525] ? security_file_open+0x20b/0x500 [ 1430.109524] ? may_open+0x1e4/0x400 [ 1430.110328] path_openat+0x1d51/0x26d0 [ 1430.111197] ? path_lookupat+0x860/0x860 [ 1430.112094] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1430.113232] ? SOFTIRQ_verbose+0x10/0x10 [ 1430.114115] ? lock_acquire+0x197/0x490 [ 1430.115003] do_filp_open+0x17e/0x3d0 [ 1430.115832] ? may_open_dev+0xf0/0xf0 [ 1430.116684] ? __alloc_fd+0x2a5/0x620 [ 1430.117526] ? rwlock_bug.part.0+0x90/0x90 [ 1430.118462] ? _raw_spin_unlock+0x1a/0x30 [ 1430.119362] ? __alloc_fd+0x2a5/0x620 [ 1430.120219] do_sys_openat2+0x171/0x420 [ 1430.121087] ? build_open_flags+0x690/0x690 [ 1430.122029] ? wait_for_completion+0x270/0x270 [ 1430.123027] ? rcu_read_lock_any_held+0x75/0xa0 [ 1430.124055] ? vfs_write+0x354/0xa30 [ 1430.124875] __x64_sys_creat+0xc9/0x120 [ 1430.125742] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 1430.126835] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1430.127981] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1430.129105] ? trace_hardirqs_on+0x5b/0x180 [ 1430.130049] do_syscall_64+0x33/0x40 [ 1430.130863] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1430.131986] RIP: 0033:0x7f8428451b19 [ 1430.132800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1430.136793] RSP: 002b:00007f8425985188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1430.138443] RAX: ffffffffffffffda RBX: 00007f84285650e0 RCX: 00007f8428451b19 [ 1430.139996] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 1430.141538] RBP: 00007f84259851d0 R08: 0000000000000000 R09: 0000000000000000 [ 1430.143083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1430.144651] R13: 00007ffc9c2fdc9f R14: 00007f8425985300 R15: 0000000000022000 19:06:48 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 6) 19:06:48 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x77359400}, 0x1, 0x0, 0x1, {0x0, r4}}, 0xfffffffb) clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:06:48 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @private2}, 0x1c) 19:06:48 executing program 3: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x5e033, 0xffffffffffffffff, 0x0) r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000040)=@IORING_OP_TIMEOUT={0xb, 0x2, 0x0, 0x0, 0x5, &(0x7f0000000000), 0x1, 0x1, 0x1}, 0x8c3) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x0, 0x0, 0x0) 19:06:48 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 15) 19:06:48 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x5, 0x0, @private2}, 0x1c) 19:06:48 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9", 0xc6}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:06:48 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) [ 1445.477124] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1445.479145] EXT4-fs (loop2): group descriptors corrupted! [ 1445.482286] FAULT_INJECTION: forcing a failure. [ 1445.482286] name failslab, interval 1, probability 0, space 0, times 0 [ 1445.485438] CPU: 0 PID: 12416 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1445.487213] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1445.489243] Call Trace: [ 1445.489887] dump_stack+0x107/0x167 [ 1445.490772] should_fail.cold+0x5/0xa [ 1445.491693] ? cgroup_mkdir+0x254/0xfc0 [ 1445.492665] should_failslab+0x5/0x20 [ 1445.493580] __kmalloc+0x72/0x3f0 [ 1445.494428] cgroup_mkdir+0x254/0xfc0 [ 1445.495353] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1445.496521] kernfs_iop_mkdir+0x14d/0x1e0 [ 1445.497385] vfs_mkdir+0x41f/0x660 [ 1445.498114] do_mkdirat+0x145/0x2a0 [ 1445.498863] ? user_path_create+0xf0/0xf0 [ 1445.499722] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1445.500805] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1445.501864] do_syscall_64+0x33/0x40 [ 1445.502627] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1445.503672] RIP: 0033:0x7fae7cd32b19 [ 1445.504448] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1445.508220] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1445.509773] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1445.511226] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1445.512686] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1445.514144] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1445.515595] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 19:06:49 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) [ 1445.577655] FAULT_INJECTION: forcing a failure. [ 1445.577655] name failslab, interval 1, probability 0, space 0, times 0 [ 1445.580026] CPU: 1 PID: 12435 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1445.581466] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1445.583216] Call Trace: [ 1445.583768] dump_stack+0x107/0x167 [ 1445.584573] should_fail.cold+0x5/0xa [ 1445.585351] ? create_object.isra.0+0x3a/0xa20 [ 1445.586274] should_failslab+0x5/0x20 [ 1445.587060] kmem_cache_alloc+0x5b/0x360 [ 1445.587881] ? pagecache_get_page+0x243/0xc80 [ 1445.588828] create_object.isra.0+0x3a/0xa20 [ 1445.589735] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1445.590782] kmem_cache_alloc+0x159/0x360 [ 1445.591645] ext4_free_blocks+0x915/0x20f0 [ 1445.592569] ? ext4_mb_new_blocks+0x4890/0x4890 [ 1445.593521] ? ext4_inode_block_valid+0x3ad/0x630 [ 1445.594534] ? ext4_ind_truncate_ensure_credits+0x57f/0x780 [ 1445.595711] ext4_clear_blocks+0x346/0x480 [ 1445.596599] ext4_free_data+0x16f/0x390 [ 1445.597429] ext4_free_branches+0x51c/0x680 [ 1445.598313] ? __getblk_gfp+0x4d/0x80 [ 1445.599106] ext4_free_branches+0x42e/0x680 [ 1445.600006] ext4_free_branches+0x42e/0x680 [ 1445.600908] ? ext4_free_data+0x18d/0x390 [ 1445.601771] ext4_ind_truncate+0x692/0x900 [ 1445.602651] ? ext4_ind_trans_blocks+0x80/0x80 [ 1445.603600] ? ext4_mb_mark_bb+0xd50/0xd50 [ 1445.604496] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1445.605524] ? __ext4_journal_start_sb+0x214/0x430 [ 1445.606529] ? __ext4_journal_start_sb+0x1db/0x430 [ 1445.607544] ext4_truncate+0x7b8/0x12b0 [ 1445.608395] ? ext4_punch_hole+0x1110/0x1110 [ 1445.609316] ext4_setattr+0x14c7/0x22c0 [ 1445.610132] ? current_time+0x1e6/0x2c0 [ 1445.610976] ? ext4_journalled_write_end+0x1240/0x1240 [ 1445.612060] notify_change+0xba2/0x1080 [ 1445.612895] ? mark_lock+0x2190/0x2df0 [ 1445.613797] do_truncate+0x134/0x1f0 [ 1445.614569] ? file_open_root+0x440/0x440 [ 1445.615429] ? security_file_open+0x20b/0x500 [ 1445.616393] ? may_open+0x1e4/0x400 [ 1445.617152] path_openat+0x1d51/0x26d0 [ 1445.617982] ? path_lookupat+0x860/0x860 [ 1445.618821] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1445.619888] ? SOFTIRQ_verbose+0x10/0x10 [ 1445.620735] ? lock_acquire+0x197/0x490 [ 1445.621579] do_filp_open+0x17e/0x3d0 [ 1445.622354] ? may_open_dev+0xf0/0xf0 [ 1445.623141] ? __alloc_fd+0x2a5/0x620 [ 1445.623933] ? rwlock_bug.part.0+0x90/0x90 [ 1445.624820] ? _raw_spin_unlock+0x1a/0x30 [ 1445.625665] ? __alloc_fd+0x2a5/0x620 19:06:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 7) [ 1445.626462] do_sys_openat2+0x171/0x420 [ 1445.627369] ? build_open_flags+0x690/0x690 [ 1445.628277] ? wait_for_completion+0x270/0x270 [ 1445.629223] ? rcu_read_lock_any_held+0x75/0xa0 [ 1445.630170] ? vfs_write+0x354/0xa30 [ 1445.630941] __x64_sys_creat+0xc9/0x120 [ 1445.631756] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 1445.632793] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1445.633865] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1445.634917] ? trace_hardirqs_on+0x5b/0x180 [ 1445.635805] do_syscall_64+0x33/0x40 [ 1445.636588] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1445.637638] RIP: 0033:0x7f8428451b19 [ 1445.638401] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1445.642160] RSP: 002b:00007f84259a6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1445.643714] RAX: ffffffffffffffda RBX: 00007f8428565020 RCX: 00007f8428451b19 [ 1445.645191] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 1445.646646] RBP: 00007f84259a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1445.648103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1445.649579] R13: 00007ffc9c2fdc9f R14: 00007f84259a6300 R15: 0000000000022000 19:06:49 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) io_setup(0x5, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f00000008c0)=[&(0x7f0000000200)={0x0, 0x0, 0x5, 0x1, 0x0, r1, &(0x7f0000000140)="ee", 0x1, 0x800000}]) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = dup(r4) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r5, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8936, &(0x7f0000000080)={@local, 0x78, r7}) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r7}) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)=@report={0xc8, 0x20, 0x2, 0x70bd28, 0x25dfdbff, {0x2b, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@mcast1, 0x4e24, 0x1, 0x4e22, 0x0, 0x2, 0x10, 0x20, 0x3b, 0x0, r3}}, [@migrate={0x50, 0x11, [{@in6=@mcast1, @in6=@mcast1, @in=@broadcast, @in=@loopback, 0x64, 0x3, 0x0, 0x34ff, 0xa, 0xa}]}, @XFRMA_IF_ID={0x8, 0x1f, r7}, @lifetime_val={0x24, 0x9, {0x9, 0x20a80f44, 0x91ce, 0x2}}]}, 0xc8}, 0x1, 0x0, 0x0, 0x44800}, 0x20000000) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000480)=@updsa={0x158, 0x1a, 0x1, 0x0, 0x0, {{@in=@remote, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in=@multicast2, 0x0, 0x32}, @in=@dev, {}, {0x0, 0x0, 0x7}, {}, 0x2, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'xcbc(aes)\x00'}}}, @replay_esn_val={0x1c}]}, 0x158}}, 0x0) 19:06:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9", 0xc6}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:06:49 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 16) 19:06:49 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x2) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0xc00, 0x0) clone3(&(0x7f0000001e00)={0x1200400, &(0x7f00000019c0), &(0x7f0000001bc0)=0x0, &(0x7f0000001b80), {0xbe}, &(0x7f0000001f00)=""/149, 0x95, &(0x7f0000001d00)=""/170, &(0x7f0000001dc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3}, 0x58) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x57, 0x5c, 0x0, 0x9, 0x0, 0x0, 0x42, 0x7, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x100000000, 0x6}, 0x100, 0x0, 0x2, 0x7, 0x3800000, 0x100, 0x7e6, 0x0, 0xe0, 0x0, 0x5}, r4, 0x5, r3, 0x12) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x5a, 0x40, 0x20, 0x81, 0x0, 0xff, 0x2, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0xffffffffffffffff, 0x4}, 0x8000, 0x7f, 0x8, 0x9, 0x1, 0xf0b, 0x7, 0x0, 0x0, 0x0, 0x8}, r4, 0xb, r1, 0x1b) clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 1445.907274] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1445.909355] EXT4-fs (loop2): group descriptors corrupted! [ 1445.999135] FAULT_INJECTION: forcing a failure. [ 1445.999135] name failslab, interval 1, probability 0, space 0, times 0 [ 1446.001613] CPU: 1 PID: 12545 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1446.003026] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1446.004747] Call Trace: [ 1446.005296] dump_stack+0x107/0x167 [ 1446.006056] should_fail.cold+0x5/0xa [ 1446.006854] ? create_object.isra.0+0x3a/0xa20 [ 1446.007800] should_failslab+0x5/0x20 [ 1446.008589] kmem_cache_alloc+0x5b/0x360 [ 1446.009412] ? selinux_determine_inode_label+0x1ab/0x340 [ 1446.010507] create_object.isra.0+0x3a/0xa20 [ 1446.011408] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1446.012469] __kmalloc+0x16e/0x3f0 [ 1446.013206] cgroup_mkdir+0x254/0xfc0 [ 1446.013980] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1446.014954] kernfs_iop_mkdir+0x14d/0x1e0 [ 1446.015802] vfs_mkdir+0x41f/0x660 [ 1446.016545] do_mkdirat+0x145/0x2a0 [ 1446.017279] ? user_path_create+0xf0/0xf0 [ 1446.018135] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1446.019207] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1446.020291] do_syscall_64+0x33/0x40 [ 1446.021049] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1446.022084] RIP: 0033:0x7fae7cd32b19 [ 1446.022839] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1446.026551] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1446.028097] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1446.029536] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1446.030981] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1446.032416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1446.033846] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 19:06:49 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000fc0)=[{{&(0x7f00000002c0)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x4004810) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.idle_time\x00', 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r1, 0x8, 0x7, 0x873}) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @empty, @void, {@ipv4={0x8906, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x0, 0x8}}}}}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0), 0xffffffffffffffff) 19:06:49 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) [ 1446.063967] FAULT_INJECTION: forcing a failure. [ 1446.063967] name failslab, interval 1, probability 0, space 0, times 0 [ 1446.066331] CPU: 0 PID: 12638 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1446.067742] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1446.069454] Call Trace: [ 1446.069997] dump_stack+0x107/0x167 [ 1446.070740] should_fail.cold+0x5/0xa [ 1446.071521] ? create_object.isra.0+0x3a/0xa20 [ 1446.072460] should_failslab+0x5/0x20 [ 1446.073231] kmem_cache_alloc+0x5b/0x360 [ 1446.074050] ? jbd2_journal_forget+0x3f9/0x690 [ 1446.074979] create_object.isra.0+0x3a/0xa20 [ 1446.075871] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1446.076909] kmem_cache_alloc+0x159/0x360 [ 1446.077930] ? jbd2_journal_put_journal_head+0x3f2/0x560 [ 1446.079233] insert_revoke_hash+0x28/0x270 [ 1446.080294] jbd2_journal_revoke+0x2bb/0x570 [ 1446.081358] __ext4_forget+0x218/0x480 [ 1446.082304] ext4_free_blocks+0x1943/0x20f0 [ 1446.083357] ? ext4_mb_new_blocks+0x4890/0x4890 [ 1446.084484] ? ext4_free_data+0x27e/0x390 [ 1446.085486] ? __ext4_journal_ensure_credits+0x263/0x2e0 [ 1446.086787] ? ext4_ind_truncate_ensure_credits+0x57f/0x780 [ 1446.088157] ext4_free_branches+0x2fc/0x680 [ 1446.089221] ext4_free_branches+0x42e/0x680 [ 1446.090251] ? ext4_free_data+0x18d/0x390 [ 1446.091257] ext4_ind_truncate+0x692/0x900 [ 1446.092314] ? ext4_ind_trans_blocks+0x80/0x80 [ 1446.093303] ? ext4_mb_mark_bb+0xd50/0xd50 [ 1446.094170] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1446.095180] ? __ext4_journal_start_sb+0x214/0x430 [ 1446.096162] ? __ext4_journal_start_sb+0x1db/0x430 [ 1446.097190] ext4_truncate+0x7b8/0x12b0 [ 1446.097997] ? ext4_punch_hole+0x1110/0x1110 [ 1446.098913] ext4_setattr+0x14c7/0x22c0 [ 1446.099711] ? current_time+0x1e6/0x2c0 [ 1446.100545] ? ext4_journalled_write_end+0x1240/0x1240 [ 1446.101596] notify_change+0xba2/0x1080 [ 1446.102397] ? mark_lock+0x2190/0x2df0 [ 1446.103188] do_truncate+0x134/0x1f0 [ 1446.103939] ? file_open_root+0x440/0x440 [ 1446.104799] ? security_file_open+0x20b/0x500 [ 1446.105724] ? may_open+0x1e4/0x400 [ 1446.106466] path_openat+0x1d51/0x26d0 [ 1446.107284] ? path_lookupat+0x860/0x860 [ 1446.108105] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1446.109167] ? SOFTIRQ_verbose+0x10/0x10 [ 1446.109983] ? lock_acquire+0x197/0x490 [ 1446.110801] do_filp_open+0x17e/0x3d0 [ 1446.111566] ? may_open_dev+0xf0/0xf0 [ 1446.112355] ? __alloc_fd+0x2a5/0x620 [ 1446.113139] ? rwlock_bug.part.0+0x90/0x90 [ 1446.114005] ? _raw_spin_unlock+0x1a/0x30 [ 1446.114836] ? __alloc_fd+0x2a5/0x620 [ 1446.115620] do_sys_openat2+0x171/0x420 [ 1446.116433] ? build_open_flags+0x690/0x690 [ 1446.117305] ? wait_for_completion+0x270/0x270 [ 1446.118226] ? rcu_read_lock_any_held+0x75/0xa0 [ 1446.119159] ? vfs_write+0x354/0xa30 [ 1446.119918] __x64_sys_creat+0xc9/0x120 [ 1446.120738] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 1446.121748] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1446.122804] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1446.123838] ? trace_hardirqs_on+0x5b/0x180 [ 1446.124734] do_syscall_64+0x33/0x40 [ 1446.125483] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1446.126528] RIP: 0033:0x7f8428451b19 [ 1446.127284] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1446.131023] RSP: 002b:00007f84259a6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1446.132584] RAX: ffffffffffffffda RBX: 00007f8428565020 RCX: 00007f8428451b19 [ 1446.134046] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 1446.135500] RBP: 00007f84259a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1446.136967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1446.138422] R13: 00007ffc9c2fdc9f R14: 00007f84259a6300 R15: 0000000000022000 19:06:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 8) 19:06:49 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000fc0)=[{{&(0x7f00000002c0)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x4004810) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000540)=0x0) getresuid(&(0x7f0000000580), &(0x7f00000005c0)=0x0, &(0x7f0000000600)) r5 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) r6 = getegid() keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000080)='rxrpc_s\x00', &(0x7f0000000300)=@keyring={'key_or_keyring:', r5}) keyctl$chown(0x4, r5, 0xee01, r6) getgroups(0x3, &(0x7f0000000640)=[0x0, 0x0, 0x0]) sendmsg$unix(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000080)="34348bd1344e68708e130614d6a99b278311b85d0e21a7ff9adccf451e9f642a384ae7b35a3eda425fba7cda3aa6c8a6d0ebc672f34975ab9be2b7435343e0c3398388d3098e943e50cd6c147163c3", 0x4f}, {&(0x7f0000000140)="a6af208ae614635136d985e3f7d8f04945008bb33eecfbb0d47cd990e048022ed34c01fec26fbdb4b6e754bda722328376b51a777c588944ef30b1a950098b6e4fd2a186b562bab9e85ea04a371978881168a7d799539ba2171e752a24b691514f3b40cd41e0974b0cf13287e0bad390884c432d7b47cecf10dc49", 0x7b}, {&(0x7f00000001c0)="a93b9db5d5e5b56859ba756c9b0615bda66ee10a874bc92a9516a614b876e644159e2fc05e9d2594c3216cdfd342aa69f3ec5741758b98c22c4eabd52bc420e72aa4baedf6e3bec08eff6226571901c34d5388f24cb251ecfe2cac5f960c9f981961a89006be", 0x66}, {&(0x7f0000000240)="9e8da9360c2d8e128855343b21a0eb2883209e7202e3495cd6f47f99c538044abbc306d9ae0cc4333d503b3c02622d40117cb573b0073de5f182263208b3dd2685d8ce83990b3b73a246c49142bc672a710ca8c1b9fb78e514fcb0edef", 0x5d}, {&(0x7f0000000940)="6614d2dc545cfd378d5461fd95f33848ae7790b2b601a8a167e5551a5272389b8a899b37ccf58f511bb5c9e49a51db71943829e081434e3dde76369c4f8aeb3b2f833854c34f562a02bbda3dfa4149d4032a8ab35275256988bd060fae0ffa58da5a6b802217e44c2261b4a37d2437895ad0f2fc08f3fa6a0432a57c567711a4096fcb2eaeab6deff249ee3deba4a89ef8724a28e7f3f35776bb72fe2dd86435bdf7db534afe87ea824c1e718e72af5689be589f09cf3186101b0e687ad1eb3baefc38768552177de8a729ce0235c61751cf99b074d590d5ec9a5e5ce401fc0a0f569b54d7db3f88cda4dc640d4a1397a36012754c40db263a15390d07ed574ae1b55feba27c35fb6de8063e812d64e2007b86369f1e0779dd3c74ebe4aa578a7f87fc74a98ef1f1e7677109583e6de86f06622c1815f7bd2568b7c7a6090f90287b8de688a376d1b49390ad19a714302a5f34e1a4ccdbc479d45d61f25cfc03bd62cad5eb6bedae7bf064dda802ab9d6ff9cf96a5d8a9359b5da282e45dbb82954b037addc3c78bf35175d2f89e45e0b5e6b8e2731454a88ca81fd4f254fe6314640d513da59a62388143bec7576d7adcd1af52398e13251a43aabb972335d0c368929b4973c31dde529199003dfe3ae78428fd976c7cbb37d59e0d8dc2c4c6797727b3b23723e35edee710aed10028b66feda7f46ff5a1305eaa9b9526a8b1244d961fa2db52647b6f515baef215db6a802862ceebd80bf0ed81cc7686781fa606543543645145ca1879764d12ea690734fbad7be674e2730d9a79bc3565f3c03d8afc3853889a04e9faf9830d34819cd13d46e200898ace648080c12f3b7a45fd3b883ea2036818dbd2f3552ba5aa7b4e1481d6930d5493d00ab650e19d36260b309c8c3529c5eb64413cd4c0cf4fbbbe2c84be2b00a50129edc45de3da7464ee3a7c32ca3e576466e519163c29028d9e1860c6630e221f3f90f1cec2b048d44852d2691edb3586cfe727dfceac90a0b5659a8e44ddc85083cfe71012e108aab3b2d6a8045c6f0426138ab23561bc38c4a00ea6a58f9a9fd1dd14e91207bd1f92c337a57b5a78ee4fcf390d447c32707deca0efd361637f89d7cb2d9a2ec4d8a3f7adb4e669c0b31abc83013d9dc9ef3fb7c90bd33a3de028755e784a1cfac0a289d289bb6f41865072a8c4d0cd0853d3b2d73c147ac3b03ef701e6db581536fcbde0c217fcf673d5a202ad26123bf5cb33dba6451ce1a58dc6b79dacb6243277c2bd0fc785f4bc04da62f5beca0d3d893749b184f24f2da22ce746e351f7cb48a5b42834fdb43992d7066c711405d498d0df480d8fb82cc1c7d8761240e764587403ccb4118912841d39f479602041a4def7aa125477932852cb859b5041dba430425d56cfd119c656c78556f297ef629526eafcade81724fa05deb09875214615ddb44108c81be28fa46c578de38fcfe4fcc6b9a175bb990a675d43153f9a02183613b2f140b51123d8082cd4154800a08e1a31a1a19651274946c603174116f269012eb7981cc839232f7972d269ad497e427e5d9f9f31ec08ce6d81f255eaf254b28f78f5320199a5f4fcb6c2955e5e8ccb9b22ede4f4a119892646b8424a01773ff78be6fa1f0414c98715be592d253ea484aaf902577d97985bb18a4ac885709d3a1ef738289baff57a64edc9098e88b5b1bfcb18ba129836a8ec590210200e814c75a793ffb41c041bbcbb3578d94a97d908a45a1d3a6d1a91af862b72406a2cd4d740dcd465268c54eb0b000828ee6e5efcd1fa068bb3ab5fcb568629dfc8f12953114ffc3d114208b2261439a6dc41c2642707acd45d671ca0622be1a14e1aa2ee2845a3c1ea3509d3b6f5ff9da77af17a42c484f833eaea347ec9fbd7489376a0a6c7a9dcd97ea7833cdce125990f91c85669f9dd2336363792642ce4effa9df64bee6f6af94c4a9ff26f428be12814f2f77f0accc63f22c08e668c0b1372355cd507a178a35627ef35f7fa140c4a79356c0f6f7d7d5ee581d560e3ffaffa13c5314975ff42676664055dfd9fc28417fdce35302a828b4d909bea86e9519fb1a832a1bbbdc0bf48e4e22536ebc7549d2e1b3559b652c9bb40ee33f835e9111ccec5a8347f302be49eed1063bcf1ee1f2305e308bcab09dd4cb654a6bc51236b123663d20df825bf649fef560828d580e280d317d5b32383ef167f883c7390524b76ab25e5c8d6c73ce20609d94c606e1a8151976e4686854bae5a2642fbfe4ac393091a4b7e8add8223e15f22c245415eb8cac2afba8a171da483f1bfd9db175ae439f89d497bc319c6624929aba89c12b2e4f9d6c73c628a39f588799f931a54a708a2e2d5f21438098f061b254513d6f3272eeabf6a5a3e304cea63163a021251344992acf6d0b8eb82aa62422d57b36562357dcdafe958baf050525151fc0d30d0ced61e7e411026f94912b5ecc29e8d2743d446e60500262c26ad2abfdf84283a396e7fd9de799a1b5937da6dbc15d11c26cc188bdd6fe9b595d3592c0d165c2e7eb8b2266ecb15bfe22e7202e2372bf0756b43a0121967af10658a744b28757f8833d9cfdf3e258f58d2d44d99f6a693e692ff5a864e68554774062038aff656b7bdfa9a71914cb78314b059fa1bbd9a94cef7de5534084dc02713ec9952adb408d4f2c23d3d31de2ace009c3f3f62900e5605661b2645a80497444d97c45755a6e40bd1101880399230f4910e5c182c01d6cdbf27920105664faf9be5ba9e9c03086867ee971a12718473a703597b4a116cc8e32e631d18679a5cdf24a2a2d5cd2fca184edbc8fc7b317b6544f48c3a9d9516413fcf76b3055c84ea4998a62ea0e62b6ed53bf8214132f8a4f44c9397b7b6cc655bb4d97e1b0831ed33ed5f461b68347ff0e3cde75458587029dc4b8c59014300b609b59ca833cd23aa14d8e6ae362a8c84f43e9e9bd7b928a3665dcf35dafd9410ce721dc442e4f01b5e9fdb1316bee4f9735ecc11396325443e92ff1362c7d8e727e5f273d4381b6c307f8fa88cf4b643f5235e56e8fc94ce1926c589bbf775b254bdb91b9d5f53e7b5eb8775d72dcca3fe2d4f8150f8b3671916eec4ec6a911dbf73a67c8e2e3e54a16533788060aa424b7360282994f0fa9d85614bbe928084921a0cd24b5f8b01e89274e85be88cfdf4c566421243f8f1d7879bab956c2ca388d150761ac595baebfd2f1c72882a79495e7dce2ba198c13cbfd4185f5185ad0687e285576dfab64680dc2a64ad9c1d473784e05d3688a0995095c3e8181dd7aad31d39a5a9547e59ac1a62787f8510dc03feae5d2090c2373c1bbbf51c2f8cab20654bc69699accba1973db5b4dc0daae9cb549eb0a006ed7ac5a72ca29c53e229f39f6a65713ca06d10b8c58935a3fce7c820e5d61a539721f5fbec2d06d0aaa533c4e05d48bc4498aef9638bd7b4d7e3158befeaf8498d49d11a7531b31a0b5374c3877131625e70cdacbf87db236a76f6bb2de8295a123bfa016f5eb6de4a9834873b152d43a8528d353d80d0beb57145dbd3e79eca6378a1caedc104b3429dc9fd8660dbbd492d2d80b7677c4524c263806aabd3f2d318ff06ea32b0bc7b4ec5cc7dc7875360d8c3dd81c63f1dc719f966f8ff715332909249f348db003a609e1e3c3c5a2b426e1ec48d0167f99fa74e4fb50bed490a934aaf78b9bf54868f085b334869286866dc02e663f26a85cc6298446a8be53f63584e091a0f90e72804d3868ce38e6633952edbab927f20c97d4cf8db8e4d882dc612fbc5403e599890fcee09812f2b7ecf2b2578b1fa0f48400b7d0800ae1913ce89f6f79ba526f4a85870e00657e9685de8d8592a2778d764ad27adb56ff45d833073976e03095ce9cbf3485459d9a2e387f626a1ab02a9ef1c84d0e447696ddc492db333247b6e8ce23a26cf54b5ebee78f7ba6402e0911e1af639c8f4d337f11aea49853bb8cb3ff2afa9ff755806907f679474fb30db77ef606ec225d8c2248170014ad238d4eb44c6830059e6a679ed328045d0c5a1a2b162352e31b3de19b331baa5f0caf01d69144ac5d9463ab0bc38a33208b3045e34fdcb09a6e73d7e3b536c10f9f26851b9063e20d1661c8dbdfca63757c86b0962090f2c7ddffbf77e46f9833c523d0323f54c59e8faa28f3e9280d51d425747ee1c7eccb96b4739c44855055c1b749406a217b4cc50b151833dd204468ef249470810e6f3d1ae10898b75ad0d506c77cf1298e956dd051648baa83b6bead17dcfa20e9ceb7bcf9dd0b4fcf64b50366dcf79cc8c28e018663fd404670a0791fa7bcd32705d9e870564aaabd570555555a68b279b2664a1e3b1a1c66cefb1af876cdad80411b05308ffdd1d73bf946463b3058eb16a7865f8620240bf00437dafbe2b644d64d2877167af3633876e8f9f29123df2775fe15ed11badffc9b22e708814e83d98f146409befe860ad5779d0dcfb841f6a7eaa1b0002928ad812ebce49b877915262f8658005d8a772b7668a459e643b6febfdc08480adf223e4a08db82ee396647c455208f751d55cad4ab37a3686a6351f484a20273ac08a297d0dd8702dfdf42fa8ff5b9d4d63eb6e93c6d0d3ec9f4c2767ddec351ef4cdd7ceb86faba1e67283a317110efae794047bce6bd9243dc76a4afac24866f705949142ead87a7ba63caea25d366fa98efeafe96b5bd38959c5fb70debdd4d34e48ba037c5341978f84e8d257480fc9764b9b7b7bb52e32deb394dafe257ec975688381e883e9d61ad854ae251535643b6fcf60e9e5fbb8034fc0006821143814198ca99562da31c6af50fc491aa0e9b794f2202031145d959e82c5a72f64e39089ce69314abdaaf72ca32c8b014c65c2acfe2f95cdb9d177f9dbe697004aa86c145a18ec7acc96ef4d05b1f13e259dbd13010aa203f3bddd9f2d028bac2a5989600b7fb046402c8e729e849d8d3833b2f27a36131691ff6310bd66fb01d5a42b5778f5d0df00697e481ee623e5b95a460bdbf1aebc0589e11513e2a992e31729ec4b69ebe9a6dda90fa30f42184dc2127a2997e4028d46cc578d31df2f3bb5378048f6f17b42c75b08d685fc536ae224bbc08a16153d9774949a308cff847bb448c96b1d89511aadad50648ffb1cca19acd553fbb50f12b6333f9482297d3f6bcc694b2e1c5558578b5424aa14f7848e6a6e3235bcfe00966893019d0f87909b671b5efaf835260ee8a781a3c5a32378f5ed816ebffb28225c24062eccc14da83f5cbd5bf91a1ea3ff6a4395ce34d216fbb3832a2a6d44f5d0acd6cc9f3eee50eb84891f8a408baf23dfc8f1730cd8b10331e87a3465aaab388e9e86301710469dc1c4ef8aa8e4625c753e6bd3a8475b92e2bd94341a70547b08a366d1d8dc3fe798941f9253690526681cd9fa6840c4749fc69f7290dbfdf159c4377dd8d8eb8f87010812ff81767557e8cf2c922724cb4618c9de1a8feec2e5c2bb1a4738b9f2733036b7fcaf1b17acac3f87e7197f2f16344542c61984f8a713adf5f2215faaeec02b7531b54e64d59ccbf2d20b3e1bb5d5a601a6ae1d52fc33e27fe745cd496deb8676538d857e3aea4aadd8fedc37e29614292b13daa2c3a6a7228e188bfb77d50458951600770b491c6330fdbc78a046a256b21e6d6400d365a90648eba3a548e5045b33f346ccf5f16d89f583430ca4bb33e7d62a31e987f756579d62806c623338df5dd74f6519a0d396d9bd44cd5691a95c20dd3e420d3fb67c155bb6aacf3860cb09bd592cfae28b6f95ef41f1", 0x1000}, {&(0x7f00000002c0)="5030093328f3c80454f2a1d0f34f0de09e1e", 0x12}], 0x6, &(0x7f0000000680)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [r2]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r3, r4, r6}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r7}}}], 0xb8, 0x44000}, 0x20000000) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r8) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r9, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 1446.487820] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1446.489879] EXT4-fs (loop2): group descriptors corrupted! [ 1446.503212] FAULT_INJECTION: forcing a failure. [ 1446.503212] name failslab, interval 1, probability 0, space 0, times 0 [ 1446.505623] CPU: 1 PID: 12666 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1446.507048] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1446.508752] Call Trace: [ 1446.509300] dump_stack+0x107/0x167 [ 1446.510059] should_fail.cold+0x5/0xa [ 1446.510842] ? create_object.isra.0+0x3a/0xa20 [ 1446.511787] should_failslab+0x5/0x20 [ 1446.512587] kmem_cache_alloc+0x5b/0x360 [ 1446.513422] create_object.isra.0+0x3a/0xa20 [ 1446.514333] kmemleak_alloc_percpu+0xa0/0x100 [ 1446.515247] pcpu_alloc+0x4e2/0x12f0 [ 1446.516034] ? cset_cgroup_from_root+0x2a0/0x2a0 [ 1446.517024] percpu_ref_init+0x31/0x3d0 [ 1446.517848] cgroup_mkdir+0x28b/0xfc0 [ 1446.518635] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1446.519607] kernfs_iop_mkdir+0x14d/0x1e0 [ 1446.520481] vfs_mkdir+0x41f/0x660 [ 1446.521208] do_mkdirat+0x145/0x2a0 [ 1446.521959] ? user_path_create+0xf0/0xf0 [ 1446.522809] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1446.523883] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1446.524969] do_syscall_64+0x33/0x40 [ 1446.525728] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1446.526775] RIP: 0033:0x7fae7cd32b19 [ 1446.527537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1446.531288] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1446.532844] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1446.534343] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1446.535887] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1446.537346] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1446.538803] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 19:07:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 9) 19:07:04 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9", 0xc6}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:07:04 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="000f256bcd97d4240ebf0300a003ec517b121b66ceaf65946de73018975a28a3770f47c701d70504000000000000006b86cfba5e16d772d269221414b9da9406ad12e2e4717e7103e052a894962ae411ca375d3c2549f4fb0d5654fc9e641f5dd20803928b69bd2138eb5d09fabdc96bc3cb22ad151e1ee50a0c03b4c1688e830a1d552f5590a74a6699f38857a60f94f8a36f1a8a7da7a6d6b174e55a559ebf302fa04f7096fbd8f401ba8c78978d97cd20f63b6d348978bca796f852b942873fab9777682e5e914b6c9eaf345dc93178f3f2dd287b89820000000000000000000000ec00001c9e746babb574b1fa04abe51dd4000320ee5c3b4c871dd965c387dd3ab0c12e7af8ce58c8a277f3acd07a96195163b040e7ef0ed30ab6abeaebb9086af9d225f218f31179e4b984391e7538b4ee3c886f3ff0581f8ce0ce3bfff615000000000000000000b01310e9ca42922cdf900c976b3712750292e63c2fb62a4c1a7d9740e0827a627673df245f5b69201dae"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6332f9bfc45e88bc}, 0xff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, 0x0, 0x1, 0x0, 0x0, {0x4}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x20}}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) r7 = dup(r6) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r7, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f0000000080)={@local, 0x78, r9}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r9}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x68, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x20048080}, 0x200008d0) 19:07:04 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000000c0)=0x30) clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:07:04 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x2, 0x0, @private2}, 0x1c) 19:07:04 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x6, 0x0, @private2}, 0x1c) 19:07:04 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 17) 19:07:04 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) [ 1461.025971] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (ad4c0000) [ 1461.031116] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1461.033017] EXT4-fs (loop2): group descriptors corrupted! [ 1461.080769] FAULT_INJECTION: forcing a failure. [ 1461.080769] name failslab, interval 1, probability 0, space 0, times 0 [ 1461.083705] CPU: 1 PID: 12684 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1461.085145] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1461.086830] Call Trace: [ 1461.087380] dump_stack+0x107/0x167 [ 1461.088125] should_fail.cold+0x5/0xa [ 1461.088921] ? create_object.isra.0+0x3a/0xa20 [ 1461.089852] ? create_object.isra.0+0x3a/0xa20 [ 1461.090794] should_failslab+0x5/0x20 [ 1461.091573] kmem_cache_alloc+0x5b/0x360 [ 1461.092417] create_object.isra.0+0x3a/0xa20 [ 1461.093326] kmemleak_alloc_percpu+0xa0/0x100 [ 1461.094247] pcpu_alloc+0x4e2/0x12f0 [ 1461.095028] ? cset_cgroup_from_root+0x2a0/0x2a0 [ 1461.095990] percpu_ref_init+0x31/0x3d0 [ 1461.096832] cgroup_mkdir+0x28b/0xfc0 [ 1461.097616] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1461.098584] kernfs_iop_mkdir+0x14d/0x1e0 [ 1461.099435] vfs_mkdir+0x41f/0x660 [ 1461.100165] do_mkdirat+0x145/0x2a0 [ 1461.100922] ? user_path_create+0xf0/0xf0 [ 1461.101778] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1461.102848] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1461.103904] do_syscall_64+0x33/0x40 [ 1461.104683] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1461.105728] RIP: 0033:0x7fae7cd32b19 [ 1461.106488] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1461.110227] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1461.111771] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1461.113238] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1461.114688] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1461.115387] FAULT_INJECTION: forcing a failure. [ 1461.115387] name failslab, interval 1, probability 0, space 0, times 0 [ 1461.116131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1461.119871] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 [ 1461.121366] CPU: 0 PID: 12746 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1461.122782] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1461.124469] Call Trace: [ 1461.125017] dump_stack+0x107/0x167 [ 1461.125766] should_fail.cold+0x5/0xa [ 1461.126543] ? create_object.isra.0+0x3a/0xa20 [ 1461.127472] should_failslab+0x5/0x20 [ 1461.128249] kmem_cache_alloc+0x5b/0x360 [ 1461.129084] ? pagecache_get_page+0x243/0xc80 [ 1461.130000] create_object.isra.0+0x3a/0xa20 [ 1461.130892] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1461.131925] kmem_cache_alloc+0x159/0x360 [ 1461.132797] ext4_free_blocks+0x915/0x20f0 [ 1461.133679] ? ext4_mb_new_blocks+0x4890/0x4890 [ 1461.134621] ? ext4_free_data+0x27e/0x390 [ 1461.135487] ? ext4_ind_truncate_ensure_credits+0x57f/0x780 [ 1461.136656] ext4_free_branches+0x2fc/0x680 [ 1461.137551] ext4_free_branches+0x42e/0x680 [ 1461.138429] ? ext4_free_data+0x18d/0x390 [ 1461.139290] ext4_ind_truncate+0x692/0x900 [ 1461.140169] ? ext4_ind_trans_blocks+0x80/0x80 [ 1461.141133] ? ext4_mb_mark_bb+0xd50/0xd50 [ 1461.142010] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1461.143022] ? __ext4_journal_start_sb+0x214/0x430 [ 1461.144010] ? __ext4_journal_start_sb+0x1db/0x430 [ 1461.145017] ext4_truncate+0x7b8/0x12b0 [ 1461.145829] ? ext4_punch_hole+0x1110/0x1110 [ 1461.146738] ext4_setattr+0x14c7/0x22c0 [ 1461.147542] ? current_time+0x1e6/0x2c0 [ 1461.148367] ? ext4_journalled_write_end+0x1240/0x1240 [ 1461.149432] notify_change+0xba2/0x1080 [ 1461.150239] ? mark_lock+0x2190/0x2df0 [ 1461.151042] do_truncate+0x134/0x1f0 [ 1461.151791] ? file_open_root+0x440/0x440 [ 1461.152646] ? security_file_open+0x20b/0x500 [ 1461.153569] ? may_open+0x1e4/0x400 [ 1461.154308] path_openat+0x1d51/0x26d0 [ 1461.155115] ? path_lookupat+0x860/0x860 [ 1461.155936] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1461.156996] ? SOFTIRQ_verbose+0x10/0x10 [ 1461.157814] ? lock_acquire+0x197/0x490 [ 1461.158634] do_filp_open+0x17e/0x3d0 [ 1461.159403] ? may_open_dev+0xf0/0xf0 [ 1461.160174] ? __alloc_fd+0x2a5/0x620 [ 1461.160974] ? rwlock_bug.part.0+0x90/0x90 [ 1461.161842] ? _raw_spin_unlock+0x1a/0x30 [ 1461.162678] ? __alloc_fd+0x2a5/0x620 [ 1461.163464] do_sys_openat2+0x171/0x420 [ 1461.164269] ? build_open_flags+0x690/0x690 [ 1461.165149] ? wait_for_completion+0x270/0x270 [ 1461.166073] ? rcu_read_lock_any_held+0x75/0xa0 [ 1461.167007] ? vfs_write+0x354/0xa30 [ 1461.167768] __x64_sys_creat+0xc9/0x120 [ 1461.168586] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 1461.169598] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1461.170654] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1461.171697] ? trace_hardirqs_on+0x5b/0x180 [ 1461.172593] do_syscall_64+0x33/0x40 [ 1461.173348] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1461.174381] RIP: 0033:0x7f8428451b19 [ 1461.175134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1461.178828] RSP: 002b:00007f84259a6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1461.180360] RAX: ffffffffffffffda RBX: 00007f8428565020 RCX: 00007f8428451b19 [ 1461.181815] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 1461.183251] RBP: 00007f84259a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1461.184692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1461.186130] R13: 00007ffc9c2fdc9f R14: 00007f84259a6300 R15: 0000000000022000 19:07:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 10) 19:07:04 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000f256bcd97d4240ebf0300a003ec517b121b66ceaf65946de73018975a28a3770f47c701d70504000000000000006b86cfba5e16d772d269221414b9da9406ad12e2e4717e7103e052a894962ae411ca375d3c2549f4fb0d5654fc9e641f5dd20803928b69bd2138eb5d09fabdc96bc3cb22ad151e1ee50a0c03b4c1688e830a1d552f5590a74a6699f38857a60f94f8a36f1a8a7da7a6d6b174e55a559ebf302fa04f7096fbd8f401ba8c78978d97cd20f63b6d348978bca796f852b942873fab9777682e5e914b6c9eaf345dc93178f3f2dd287b89820000000000000000000000ec00001c9e746babb574b1fa04abe51dd4000320ee5c3b4c871dd965c387dd3ab0c12e7af8ce58c8a277f3acd07a96195163b040e7ef0ed30ab6abeaebb9086af9d225f218f31179e4b984391e7538b4ee3c886f3ff0581f8ce0ce3bfff615000000000000000000"]) 19:07:04 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 18) 19:07:04 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6332f9bfc45e88bc}, 0xff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, 0x0, 0x1, 0x0, 0x0, {0x4}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x20}}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) r7 = dup(r6) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r7, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f0000000080)={@local, 0x78, r9}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r9}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x68, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x20048080}, 0x200008d0) 19:07:04 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43f", 0xcd}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:07:04 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) io_setup(0x5, &(0x7f0000000080)=0x0) r4 = fsmount(r2, 0x1, 0x70) mmap$perf(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x800003, 0x13, r4, 0x7) r5 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x9) io_submit(r3, 0x5, &(0x7f0000000c00)=[&(0x7f0000000600)={0x0, 0x0, 0x0, 0x3, 0x9, r5, &(0x7f0000000500)="df55b59e8ae475d17cc7c6487ecd841b2c825caa959f220095e8775e69ed303bd21452328dc25c746b1c1c33111c6ebdea8e5091bf1e3deeabe6728b6e27776ac99a3eea38481fdd0958a76057cea629ddce7649f84e193bdec7eec355a7a1b69cefd91a31aeacc56fa084232e75a7b8b0ca05b436dbaef48eecbe9b583de143a58b212136a7038606f03f56cb2de072e29cde05ff52d0d9a327578e3d2411d9ba6c16d5ce3995cae28bf9fa2eba42e746cfb33ca03a4f79ef54672e77df20e586fd", 0xc2, 0x80000001, 0x0, 0x1}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0xc, 0x5, 0xffffffffffffffff, &(0x7f0000000800)="edbd5913910034c3ee39852d2090a1ba973fe43b87945e946944f4d7f7beb87ed4252ff0be51a120640f9ba0b8a0806ddd1c482caa33efb7f5a0a94231bb", 0x3e, 0x1, 0x0, 0x3}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x3, 0x4, r1, &(0x7f0000000940)="91b1d769b04b8ce68e8a4d23d1c7746969426e35b541e94441ba4026e6e5a59dd53d9605982cc13a9a472fa6702f70739ba462b037e743a04b04a5eefd9125867e32290d7aa983a42771cff33408014e2e9fa87d74d6d7661638c8ee5909a327b255f46f3b7912b995d9ab02e4ac70fe24281dbbd5e4ee719f0cd8ea837bf8bcb9fa62adbd82de7118a66eb70efa291f32e1427f75a14c274bf9710649530d1e9dd8f609362c5789e4297f845f88b63eb4085ef69612303eaf", 0xb9, 0x401, 0x0, 0x3}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000000a00)="47cf50322eccf88ba820aa8a934cdc3060f45d978d318631912fb1ae64508f8512fc2d4531385b7f6f756df51e8056de0aa4ef9133ab7976071c3086fc1df39a7639fbb49f10ece8c9b8af4b1a7d9ca9edc1550693395bedef32081ee3f5eacbb5f0a36dd71c7d4f6e8065a41b289e50c6c60325995a136cd9ffcbac23c099a34a2011070c77889b41779dc8835289d5b095c63f1ee1b191b6538fe0e2a3ff883ee21dfa90d9b5fadd00598e", 0xac, 0x5, 0x0, 0x1, r2}, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x2, 0x8000, 0xffffffffffffffff, &(0x7f0000000b00)="713c23b1ce63e80cb8343e1c72017f8bceabd28adb3288afc431e37554e115b444171078bc90aff83e6a5ae22be2f4bb25a2f805eb72b9b4bd6fb0151dae17563ba90301a4d567a1a0d293c8e3a89a317ab5d9f3abef137c0094406e044bb9c4f8bc86231354dcd9a28fcc60baff9ff480d19b03e0ffd9b4086a466ef2d02d53898a0c", 0x83, 0x8, 0x0, 0x3}]) creat(&(0x7f0000000040)='./file0\x00', 0x0) vmsplice(r0, &(0x7f0000000200)=[{&(0x7f00000001c0)="3c7eed80c95c7b8501234f9c01656039", 0x10}], 0x1, 0xe) preadv(r0, &(0x7f00000004c0)=[{&(0x7f0000000240)=""/23, 0x17}, {&(0x7f0000000280)=""/17, 0x11}, {&(0x7f00000002c0)=""/248, 0xf8}, {&(0x7f00000003c0)=""/253, 0xfd}], 0x4, 0x7fff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/bus/pci', 0x80040, 0x9d) fsetxattr$security_capability(r6, &(0x7f0000000140), &(0x7f0000000180)=@v1={0x1000000, [{0x80, 0x2}]}, 0xc, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000080)=0x1) clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 1461.389034] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1461.391015] EXT4-fs (loop2): group descriptors corrupted! [ 1461.402752] FAULT_INJECTION: forcing a failure. [ 1461.402752] name failslab, interval 1, probability 0, space 0, times 0 [ 1461.405130] CPU: 1 PID: 12807 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1461.406561] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1461.408231] Call Trace: [ 1461.408808] dump_stack+0x107/0x167 [ 1461.409568] should_fail.cold+0x5/0xa [ 1461.410373] ? percpu_ref_init+0xd8/0x3d0 [ 1461.411230] should_failslab+0x5/0x20 [ 1461.412008] kmem_cache_alloc_trace+0x55/0x360 [ 1461.412949] ? cset_cgroup_from_root+0x2a0/0x2a0 [ 1461.413909] percpu_ref_init+0xd8/0x3d0 [ 1461.414725] cgroup_mkdir+0x28b/0xfc0 [ 1461.415522] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1461.416503] kernfs_iop_mkdir+0x14d/0x1e0 [ 1461.417360] vfs_mkdir+0x41f/0x660 [ 1461.418094] do_mkdirat+0x145/0x2a0 [ 1461.418845] ? user_path_create+0xf0/0xf0 [ 1461.419704] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1461.420786] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1461.421845] do_syscall_64+0x33/0x40 [ 1461.422609] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1461.423661] RIP: 0033:0x7fae7cd32b19 [ 1461.424429] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1461.428172] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1461.429742] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1461.431205] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1461.432666] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1461.434129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1461.435566] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 [ 1461.570049] FAULT_INJECTION: forcing a failure. [ 1461.570049] name failslab, interval 1, probability 0, space 0, times 0 [ 1461.572616] CPU: 0 PID: 12810 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1461.574068] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1461.575791] Call Trace: [ 1461.576369] dump_stack+0x107/0x167 [ 1461.577187] should_fail.cold+0x5/0xa [ 1461.578008] ? create_object.isra.0+0x3a/0xa20 [ 1461.578988] should_failslab+0x5/0x20 [ 1461.579795] kmem_cache_alloc+0x5b/0x360 [ 1461.580672] ? jbd2_journal_forget+0x3f9/0x690 [ 1461.581666] create_object.isra.0+0x3a/0xa20 [ 1461.582594] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1461.583682] kmem_cache_alloc+0x159/0x360 [ 1461.584563] ? jbd2_journal_put_journal_head+0x3f2/0x560 [ 1461.585703] insert_revoke_hash+0x28/0x270 [ 1461.586616] jbd2_journal_revoke+0x2bb/0x570 [ 1461.587566] __ext4_forget+0x218/0x480 [ 1461.588444] ext4_free_blocks+0x1943/0x20f0 [ 1461.589427] ? ext4_mb_new_blocks+0x4890/0x4890 [ 1461.590406] ? ext4_free_data+0x27e/0x390 [ 1461.591293] ? __ext4_journal_ensure_credits+0x263/0x2e0 [ 1461.592432] ? ext4_ind_truncate_ensure_credits+0x57f/0x780 [ 1461.593619] ext4_free_branches+0x2fc/0x680 [ 1461.594543] ext4_free_branches+0x42e/0x680 [ 1461.595437] ? ext4_free_data+0x18d/0x390 [ 1461.596320] ext4_ind_truncate+0x692/0x900 [ 1461.597220] ? ext4_ind_trans_blocks+0x80/0x80 [ 1461.598178] ? ext4_mb_mark_bb+0xd50/0xd50 [ 1461.599077] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1461.600111] ? __ext4_journal_start_sb+0x214/0x430 [ 1461.601135] ? __ext4_journal_start_sb+0x1db/0x430 [ 1461.602160] ext4_truncate+0x7b8/0x12b0 [ 1461.602998] ? ext4_punch_hole+0x1110/0x1110 [ 1461.603941] ext4_setattr+0x14c7/0x22c0 [ 1461.604761] ? current_time+0x1e6/0x2c0 [ 1461.605625] ? ext4_journalled_write_end+0x1240/0x1240 [ 1461.606707] notify_change+0xba2/0x1080 [ 1461.607529] ? mark_lock+0x2190/0x2df0 [ 1461.608350] do_truncate+0x134/0x1f0 [ 1461.609138] ? file_open_root+0x440/0x440 [ 1461.610000] ? security_file_open+0x20b/0x500 [ 1461.610973] ? may_open+0x1e4/0x400 [ 1461.611741] path_openat+0x1d51/0x26d0 [ 1461.612598] ? path_lookupat+0x860/0x860 [ 1461.613448] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1461.614526] ? SOFTIRQ_verbose+0x10/0x10 [ 1461.615361] ? lock_acquire+0x197/0x490 [ 1461.616225] do_filp_open+0x17e/0x3d0 [ 1461.617024] ? may_open_dev+0xf0/0xf0 [ 1461.617822] ? __alloc_fd+0x2a5/0x620 [ 1461.618624] ? _find_next_bit.constprop.0+0x3d/0x200 [ 1461.619674] ? _find_next_bit.constprop.0+0x66/0x200 [ 1461.620766] ? _raw_spin_unlock+0x1a/0x30 [ 1461.621619] ? __alloc_fd+0x2a5/0x620 [ 1461.622440] do_sys_openat2+0x171/0x420 [ 1461.623269] ? build_open_flags+0x690/0x690 [ 1461.624163] ? wait_for_completion+0x270/0x270 [ 1461.625120] ? rcu_read_lock_any_held+0x75/0xa0 [ 1461.626072] ? vfs_write+0x354/0xa30 [ 1461.626858] __x64_sys_creat+0xc9/0x120 [ 1461.627681] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 1461.628730] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1461.629831] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1461.630913] ? trace_hardirqs_on+0x5b/0x180 [ 1461.631801] do_syscall_64+0x33/0x40 [ 1461.632591] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1461.633635] RIP: 0033:0x7f8428451b19 [ 1461.634416] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1461.638195] RSP: 002b:00007f84259c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1461.639763] RAX: ffffffffffffffda RBX: 00007f8428564f60 RCX: 00007f8428451b19 [ 1461.641242] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 1461.642695] RBP: 00007f84259c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 1461.644174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1461.645626] R13: 00007ffc9c2fdc9f R14: 00007f84259c7300 R15: 0000000000022000 [ 1461.722983] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (ad4c0000) 19:07:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43f", 0xcd}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:07:18 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x3, 0x0, @private2}, 0x1c) 19:07:18 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x2, 0x1}, 0xe) 19:07:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 11) 19:07:18 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 19) 19:07:18 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6332f9bfc45e88bc}, 0xff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, 0x0, 0x1, 0x0, 0x0, {0x4}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x20}}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) r7 = dup(r6) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r7, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f0000000080)={@local, 0x78, r9}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r9}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x68, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x20048080}, 0x200008d0) 19:07:18 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x7, 0x0, @private2}, 0x1c) 19:07:18 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) [ 1474.976041] FAULT_INJECTION: forcing a failure. [ 1474.976041] name failslab, interval 1, probability 0, space 0, times 0 [ 1474.979602] CPU: 1 PID: 12938 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1474.981322] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1474.982995] Call Trace: [ 1474.983644] dump_stack+0x107/0x167 [ 1474.984396] should_fail.cold+0x5/0xa [ 1474.985353] ? create_object.isra.0+0x3a/0xa20 [ 1474.986278] should_failslab+0x5/0x20 [ 1474.987209] kmem_cache_alloc+0x5b/0x360 [ 1474.988041] create_object.isra.0+0x3a/0xa20 [ 1474.989123] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1474.990160] kmem_cache_alloc_trace+0x151/0x360 [ 1474.991127] ? cset_cgroup_from_root+0x2a0/0x2a0 [ 1474.992095] percpu_ref_init+0xd8/0x3d0 [ 1474.992922] cgroup_mkdir+0x28b/0xfc0 [ 1474.993711] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1474.994682] kernfs_iop_mkdir+0x14d/0x1e0 [ 1474.995639] vfs_mkdir+0x41f/0x660 [ 1474.996457] do_mkdirat+0x145/0x2a0 [ 1474.997365] ? user_path_create+0xf0/0xf0 [ 1474.998332] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1474.999493] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1475.000542] do_syscall_64+0x33/0x40 [ 1475.001325] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1475.002525] RIP: 0033:0x7fae7cd32b19 [ 1475.003406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1475.007363] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1475.008912] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1475.010349] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1475.011783] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1475.013229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1475.014664] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 [ 1475.037912] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1475.039082] EXT4-fs (loop2): group descriptors corrupted! [ 1475.039967] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (ad4c0000) 19:07:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43f", 0xcd}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) [ 1475.065748] FAULT_INJECTION: forcing a failure. [ 1475.065748] name failslab, interval 1, probability 0, space 0, times 0 [ 1475.068111] CPU: 1 PID: 12942 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1475.069616] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1475.071320] Call Trace: [ 1475.071882] dump_stack+0x107/0x167 [ 1475.072652] should_fail.cold+0x5/0xa [ 1475.073425] ? create_object.isra.0+0x3a/0xa20 [ 1475.074390] should_failslab+0x5/0x20 [ 1475.075177] kmem_cache_alloc+0x5b/0x360 [ 1475.076021] ? jbd2_journal_forget+0x3f9/0x690 [ 1475.076984] create_object.isra.0+0x3a/0xa20 [ 1475.077872] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 19:07:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 12) [ 1475.078908] kmem_cache_alloc+0x159/0x360 [ 1475.079834] ? jbd2_journal_put_journal_head+0x3f2/0x560 [ 1475.080945] insert_revoke_hash+0x28/0x270 [ 1475.081803] jbd2_journal_revoke+0x2bb/0x570 [ 1475.082689] __ext4_forget+0x218/0x480 [ 1475.083482] ext4_free_blocks+0x1943/0x20f0 [ 1475.084391] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 1475.085467] ? ext4_mb_new_blocks+0x4890/0x4890 [ 1475.086423] ? __ext4_handle_dirty_metadata+0x1f3/0x720 [ 1475.087492] ? __ext4_journal_ensure_credits+0x263/0x2e0 [ 1475.088611] ? ext4_ind_truncate_ensure_credits+0x57f/0x780 [ 1475.089767] ext4_free_branches+0x2fc/0x680 [ 1475.090658] ext4_ind_truncate+0x692/0x900 [ 1475.091529] ? ext4_ind_trans_blocks+0x80/0x80 [ 1475.092467] ? ext4_mb_mark_bb+0xd50/0xd50 [ 1475.093354] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1475.094366] ? __ext4_journal_start_sb+0x214/0x430 [ 1475.095357] ? __ext4_journal_start_sb+0x1db/0x430 [ 1475.096358] ext4_truncate+0x7b8/0x12b0 19:07:18 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) chdir(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:07:18 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) [ 1475.097194] ? ext4_punch_hole+0x1110/0x1110 [ 1475.098273] ext4_setattr+0x14c7/0x22c0 [ 1475.099076] ? current_time+0x1e6/0x2c0 [ 1475.099929] ? ext4_journalled_write_end+0x1240/0x1240 [ 1475.100995] notify_change+0xba2/0x1080 [ 1475.101796] ? mark_lock+0x2190/0x2df0 [ 1475.102595] do_truncate+0x134/0x1f0 [ 1475.103346] ? file_open_root+0x440/0x440 [ 1475.104181] ? security_file_open+0x20b/0x500 [ 1475.105129] ? may_open+0x1e4/0x400 [ 1475.105881] path_openat+0x1d51/0x26d0 [ 1475.106684] ? path_lookupat+0x860/0x860 [ 1475.107507] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1475.108567] ? SOFTIRQ_verbose+0x10/0x10 [ 1475.109382] ? lock_acquire+0x197/0x490 [ 1475.110206] do_filp_open+0x17e/0x3d0 [ 1475.110980] ? may_open_dev+0xf0/0xf0 [ 1475.111760] ? __alloc_fd+0x2a5/0x620 [ 1475.112547] ? rwlock_bug.part.0+0x90/0x90 [ 1475.113441] ? _raw_spin_unlock+0x1a/0x30 [ 1475.114274] ? __alloc_fd+0x2a5/0x620 [ 1475.115070] do_sys_openat2+0x171/0x420 [ 1475.115918] ? build_open_flags+0x690/0x690 [ 1475.116833] ? wait_for_completion+0x270/0x270 [ 1475.117797] ? rcu_read_lock_any_held+0x75/0xa0 [ 1475.118747] ? vfs_write+0x354/0xa30 [ 1475.119505] __x64_sys_creat+0xc9/0x120 [ 1475.120325] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 1475.121452] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1475.122822] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1475.124189] ? trace_hardirqs_on+0x5b/0x180 [ 1475.125343] do_syscall_64+0x33/0x40 [ 1475.126287] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1475.127337] RIP: 0033:0x7f8428451b19 [ 1475.128124] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1475.132071] RSP: 002b:00007f84259c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1475.134003] RAX: ffffffffffffffda RBX: 00007f8428564f60 RCX: 00007f8428451b19 [ 1475.135538] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 1475.137035] RBP: 00007f84259c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 1475.138481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1475.139953] R13: 00007ffc9c2fdc9f R14: 00007f84259c7300 R15: 0000000000022000 19:07:18 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6332f9bfc45e88bc}, 0xff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, 0x0, 0x1, 0x0, 0x0, {0x4}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x20}}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) r7 = dup(r6) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r7, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f0000000080)={@local, 0x78, r9}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r9}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x68, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x20048080}, 0x200008d0) 19:07:18 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 20) [ 1475.388665] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1475.389933] EXT4-fs (loop2): group descriptors corrupted! 19:07:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e5", 0xd0}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) [ 1475.430034] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (ad4c0000) [ 1475.465320] FAULT_INJECTION: forcing a failure. [ 1475.465320] name failslab, interval 1, probability 0, space 0, times 0 [ 1475.467715] CPU: 1 PID: 12967 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1475.469130] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1475.470799] Call Trace: [ 1475.471341] dump_stack+0x107/0x167 [ 1475.472092] should_fail.cold+0x5/0xa [ 1475.472869] ? create_object.isra.0+0x3a/0xa20 [ 1475.473791] should_failslab+0x5/0x20 [ 1475.474567] kmem_cache_alloc+0x5b/0x360 [ 1475.475395] create_object.isra.0+0x3a/0xa20 [ 1475.476296] kmemleak_alloc_percpu+0xa0/0x100 [ 1475.477205] pcpu_alloc+0x4e2/0x12f0 [ 1475.477987] cgroup_rstat_init+0x14f/0x1f0 [ 1475.478846] cgroup_mkdir+0x709/0xfc0 [ 1475.479622] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1475.480596] kernfs_iop_mkdir+0x14d/0x1e0 [ 1475.481437] vfs_mkdir+0x41f/0x660 [ 1475.482157] do_mkdirat+0x145/0x2a0 [ 1475.482888] ? user_path_create+0xf0/0xf0 [ 1475.483727] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1475.484783] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1475.485820] do_syscall_64+0x33/0x40 [ 1475.486566] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1475.487604] RIP: 0033:0x7fae7cd32b19 [ 1475.488357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1475.492208] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1475.493756] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1475.495184] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1475.496620] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1475.498063] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1475.499483] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 [ 1475.526192] FAULT_INJECTION: forcing a failure. [ 1475.526192] name failslab, interval 1, probability 0, space 0, times 0 [ 1475.528610] CPU: 1 PID: 12969 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1475.530010] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1475.531669] Call Trace: [ 1475.532207] dump_stack+0x107/0x167 [ 1475.533000] should_fail.cold+0x5/0xa [ 1475.533816] ? jbd2__journal_start+0x190/0x890 [ 1475.534760] should_failslab+0x5/0x20 [ 1475.535542] kmem_cache_alloc+0x5b/0x360 [ 1475.536380] ? lock_downgrade+0x6d0/0x6d0 [ 1475.537311] jbd2__journal_start+0x190/0x890 [ 1475.538245] __ext4_journal_start_sb+0x214/0x430 [ 1475.539215] ext4_dirty_inode+0xbc/0x130 [ 1475.540043] ? ext4_setattr+0x22c0/0x22c0 [ 1475.540911] __mark_inode_dirty+0x492/0xf10 [ 1475.541797] ext4_setattr+0x1236/0x22c0 [ 1475.542603] ? current_time+0x1e6/0x2c0 [ 1475.543425] ? ext4_journalled_write_end+0x1240/0x1240 [ 1475.544489] notify_change+0xba2/0x1080 [ 1475.545331] ? mark_lock+0x2190/0x2df0 [ 1475.546132] do_truncate+0x134/0x1f0 [ 1475.546890] ? file_open_root+0x440/0x440 [ 1475.547737] ? security_file_open+0x20b/0x500 [ 1475.548697] ? may_open+0x1e4/0x400 [ 1475.549438] path_openat+0x1d51/0x26d0 [ 1475.550249] ? path_lookupat+0x860/0x860 [ 1475.551091] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1475.552204] ? SOFTIRQ_verbose+0x10/0x10 [ 1475.553107] ? lock_acquire+0x197/0x490 [ 1475.553967] do_filp_open+0x17e/0x3d0 [ 1475.554800] ? may_open_dev+0xf0/0xf0 [ 1475.555703] ? __alloc_fd+0x2a5/0x620 [ 1475.556483] ? rwlock_bug.part.0+0x90/0x90 [ 1475.557369] ? _raw_spin_unlock+0x1a/0x30 [ 1475.558202] ? __alloc_fd+0x2a5/0x620 [ 1475.558988] do_sys_openat2+0x171/0x420 [ 1475.559798] ? build_open_flags+0x690/0x690 [ 1475.560685] ? wait_for_completion+0x270/0x270 [ 1475.561611] ? rcu_read_lock_any_held+0x75/0xa0 [ 1475.562542] ? vfs_write+0x354/0xa30 [ 1475.563302] __x64_sys_creat+0xc9/0x120 [ 1475.564096] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 1475.565101] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1475.566154] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1475.567181] ? trace_hardirqs_on+0x5b/0x180 [ 1475.568046] do_syscall_64+0x33/0x40 [ 1475.568878] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1475.569901] RIP: 0033:0x7f8428451b19 [ 1475.570645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1475.574314] RSP: 002b:00007f84259c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1475.575831] RAX: ffffffffffffffda RBX: 00007f8428564f60 RCX: 00007f8428451b19 [ 1475.577268] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 1475.578709] RBP: 00007f84259c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 1475.580152] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1475.581592] R13: 00007ffc9c2fdc9f R14: 00007f84259c7300 R15: 0000000000022000 19:07:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e5", 0xd0}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:07:34 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4, 0x0, @private2}, 0x1c) 19:07:34 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0xc00, 0x0) clone3(&(0x7f0000001e00)={0x1200400, &(0x7f00000019c0), &(0x7f0000001bc0)=0x0, &(0x7f0000001b80), {0xbe}, &(0x7f0000001f00)=""/149, 0x95, &(0x7f0000001d00)=""/170, &(0x7f0000001dc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3}, 0x58) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x57, 0x5c, 0x0, 0x9, 0x0, 0x0, 0x42, 0x7, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x100000000, 0x6}, 0x100, 0x0, 0x2, 0x7, 0x3800000, 0x100, 0x7e6, 0x0, 0xe0, 0x0, 0x5}, r3, 0x5, r2, 0x12) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x1, 0x8a, 0x1, 0x7f, 0x0, 0x3, 0x20401, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x2, 0x400}, 0x1882, 0x1f, 0xfffffeff, 0x0, 0x1f8, 0x7, 0x5, 0x0, 0x1000, 0x0, 0x7fff}, r3, 0x6, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r4) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) r6 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x800) fallocate(r6, 0x4a, 0x7fff, 0x7f) 19:07:34 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6332f9bfc45e88bc}, 0xff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, 0x0, 0x1, 0x0, 0x0, {0x4}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x20}}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) r7 = dup(r6) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r7, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f0000000080)={@local, 0x78, r9}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r9}) 19:07:34 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 21) 19:07:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 13) 19:07:34 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x8, 0x0, @private2}, 0x1c) 19:07:34 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0300000024000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) [ 1490.616487] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (ad4c0000) [ 1490.652483] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1490.654517] EXT4-fs (loop2): group descriptors corrupted! [ 1490.673274] FAULT_INJECTION: forcing a failure. [ 1490.673274] name failslab, interval 1, probability 0, space 0, times 0 [ 1490.676277] CPU: 1 PID: 13097 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1490.677727] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1490.679426] Call Trace: [ 1490.679976] dump_stack+0x107/0x167 [ 1490.680742] should_fail.cold+0x5/0xa [ 1490.681574] ? create_object.isra.0+0x3a/0xa20 [ 1490.682524] should_failslab+0x5/0x20 [ 1490.683307] kmem_cache_alloc+0x5b/0x360 [ 1490.684138] ? mark_held_locks+0x9e/0xe0 [ 1490.684994] create_object.isra.0+0x3a/0xa20 [ 1490.685906] kmemleak_alloc_percpu+0xa0/0x100 [ 1490.686830] pcpu_alloc+0x4e2/0x12f0 [ 1490.687618] cgroup_rstat_init+0x14f/0x1f0 [ 1490.688489] cgroup_mkdir+0x709/0xfc0 [ 1490.689303] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1490.690278] kernfs_iop_mkdir+0x14d/0x1e0 [ 1490.691130] vfs_mkdir+0x41f/0x660 [ 1490.691871] do_mkdirat+0x145/0x2a0 [ 1490.692618] ? user_path_create+0xf0/0xf0 [ 1490.693501] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1490.694602] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1490.695655] do_syscall_64+0x33/0x40 [ 1490.696428] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1490.697482] RIP: 0033:0x7fae7cd32b19 [ 1490.698249] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1490.702050] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1490.703626] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1490.705095] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1490.706540] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1490.707989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1490.709446] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 [ 1490.729257] FAULT_INJECTION: forcing a failure. [ 1490.729257] name failslab, interval 1, probability 0, space 0, times 0 [ 1490.731739] CPU: 1 PID: 13099 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1490.733178] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1490.734877] Call Trace: [ 1490.735430] dump_stack+0x107/0x167 [ 1490.736187] should_fail.cold+0x5/0xa [ 1490.737002] ? jbd2__journal_start+0x190/0x890 [ 1490.737942] should_failslab+0x5/0x20 [ 1490.738719] kmem_cache_alloc+0x5b/0x360 [ 1490.739553] ? lock_downgrade+0x6d0/0x6d0 [ 1490.740415] jbd2__journal_start+0x190/0x890 [ 1490.741340] __ext4_journal_start_sb+0x214/0x430 [ 1490.742327] ext4_dirty_inode+0xbc/0x130 [ 1490.743173] ? ext4_setattr+0x22c0/0x22c0 [ 1490.744025] __mark_inode_dirty+0x492/0xf10 [ 1490.744928] ext4_setattr+0x1236/0x22c0 [ 1490.745732] ? current_time+0x1e6/0x2c0 [ 1490.746562] ? ext4_journalled_write_end+0x1240/0x1240 [ 1490.747621] notify_change+0xba2/0x1080 [ 1490.748434] ? mark_lock+0x2190/0x2df0 [ 1490.749243] do_truncate+0x134/0x1f0 [ 1490.750016] ? file_open_root+0x440/0x440 [ 1490.750865] ? security_file_open+0x20b/0x500 [ 1490.751801] ? may_open+0x1e4/0x400 [ 1490.752555] path_openat+0x1d51/0x26d0 [ 1490.753380] ? path_lookupat+0x860/0x860 [ 1490.754213] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1490.755286] ? SOFTIRQ_verbose+0x10/0x10 [ 1490.756110] ? lock_acquire+0x197/0x490 [ 1490.756960] do_filp_open+0x17e/0x3d0 [ 1490.757730] ? may_open_dev+0xf0/0xf0 [ 1490.758507] ? __alloc_fd+0x2a5/0x620 [ 1490.759294] ? rwlock_bug.part.0+0x90/0x90 [ 1490.760177] ? _raw_spin_unlock+0x1a/0x30 [ 1490.761035] ? __alloc_fd+0x2a5/0x620 [ 1490.761826] do_sys_openat2+0x171/0x420 [ 1490.762653] ? build_open_flags+0x690/0x690 [ 1490.763539] ? wait_for_completion+0x270/0x270 [ 1490.764493] ? rcu_read_lock_any_held+0x75/0xa0 [ 1490.765466] ? vfs_write+0x354/0xa30 [ 1490.766229] __x64_sys_creat+0xc9/0x120 [ 1490.767039] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 1490.768067] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1490.769146] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1490.770196] ? trace_hardirqs_on+0x5b/0x180 [ 1490.771079] do_syscall_64+0x33/0x40 [ 1490.771842] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1490.772901] RIP: 0033:0x7f8428451b19 [ 1490.773661] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1490.777417] RSP: 002b:00007f84259c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1490.778973] RAX: ffffffffffffffda RBX: 00007f8428564f60 RCX: 00007f8428451b19 [ 1490.780426] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 1490.781895] RBP: 00007f84259c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 1490.783349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1490.784811] R13: 00007ffc9c2fdc9f R14: 00007f84259c7300 R15: 0000000000022000 19:07:34 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x1040000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:07:34 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0300000024000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:07:34 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 22) 19:07:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 14) 19:07:34 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6332f9bfc45e88bc}, 0xff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, 0x0, 0x1, 0x0, 0x0, {0x4}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x20}}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) r7 = dup(r6) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r7, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f0000000080)={@local, 0x78, r9}) 19:07:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e5", 0xd0}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) [ 1491.085803] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1491.087938] EXT4-fs (loop2): group descriptors corrupted! [ 1491.138503] FAULT_INJECTION: forcing a failure. [ 1491.138503] name failslab, interval 1, probability 0, space 0, times 0 [ 1491.140987] CPU: 1 PID: 13222 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1491.142393] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1491.144069] Call Trace: [ 1491.144619] dump_stack+0x107/0x167 [ 1491.145397] should_fail.cold+0x5/0xa [ 1491.146170] ? jbd2__journal_start+0x190/0x890 [ 1491.147106] should_failslab+0x5/0x20 [ 1491.147905] kmem_cache_alloc+0x5b/0x360 [ 1491.148738] ? lock_downgrade+0x6d0/0x6d0 [ 1491.149599] jbd2__journal_start+0x190/0x890 [ 1491.150500] __ext4_journal_start_sb+0x214/0x430 [ 1491.151474] ext4_dirty_inode+0xbc/0x130 [ 1491.152298] ? ext4_setattr+0x22c0/0x22c0 [ 1491.153150] __mark_inode_dirty+0x492/0xf10 [ 1491.154036] ext4_setattr+0x1236/0x22c0 [ 1491.154845] ? current_time+0x1e6/0x2c0 [ 1491.155681] ? ext4_journalled_write_end+0x1240/0x1240 [ 1491.156745] notify_change+0xba2/0x1080 [ 1491.157583] ? mark_lock+0x2190/0x2df0 [ 1491.158391] do_truncate+0x134/0x1f0 [ 1491.159148] ? file_open_root+0x440/0x440 [ 1491.159997] ? security_file_open+0x20b/0x500 [ 1491.160947] ? may_open+0x1e4/0x400 [ 1491.161701] path_openat+0x1d51/0x26d0 [ 1491.162514] ? path_lookupat+0x860/0x860 [ 1491.163340] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1491.164399] ? SOFTIRQ_verbose+0x10/0x10 [ 1491.165254] ? lock_acquire+0x197/0x490 [ 1491.166085] do_filp_open+0x17e/0x3d0 [ 1491.166856] ? may_open_dev+0xf0/0xf0 [ 1491.167640] ? __alloc_fd+0x2a5/0x620 [ 1491.168431] ? rwlock_bug.part.0+0x90/0x90 [ 1491.169372] ? _raw_spin_unlock+0x1a/0x30 [ 1491.170220] ? __alloc_fd+0x2a5/0x620 [ 1491.171014] do_sys_openat2+0x171/0x420 [ 1491.171835] ? build_open_flags+0x690/0x690 [ 1491.172714] ? wait_for_completion+0x270/0x270 [ 1491.173656] ? rcu_read_lock_any_held+0x75/0xa0 [ 1491.174611] ? vfs_write+0x354/0xa30 [ 1491.175383] __x64_sys_creat+0xc9/0x120 [ 1491.176195] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 1491.177237] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1491.178322] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1491.179372] ? trace_hardirqs_on+0x5b/0x180 [ 1491.180264] do_syscall_64+0x33/0x40 [ 1491.181045] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1491.182099] RIP: 0033:0x7f8428451b19 [ 1491.182857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1491.186584] RSP: 002b:00007f84259a6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1491.188141] RAX: ffffffffffffffda RBX: 00007f8428565020 RCX: 00007f8428451b19 [ 1491.189618] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 1491.191079] RBP: 00007f84259a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1491.192532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1491.194001] R13: 00007ffc9c2fdc9f R14: 00007f84259a6300 R15: 0000000000022000 19:07:34 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0300000024000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) [ 1491.212676] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (ad4c0000) [ 1491.220385] FAULT_INJECTION: forcing a failure. [ 1491.220385] name failslab, interval 1, probability 0, space 0, times 0 [ 1491.222947] CPU: 0 PID: 13223 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1491.224372] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1491.226099] Call Trace: [ 1491.226668] dump_stack+0x107/0x167 [ 1491.227441] should_fail.cold+0x5/0xa [ 1491.228249] should_failslab+0x5/0x20 [ 1491.229052] __kmalloc_track_caller+0x79/0x3c0 [ 1491.229992] ? kstrdup_const+0x53/0x80 [ 1491.230780] ? kmemleak_alloc_percpu+0xa0/0x100 [ 1491.231731] kstrdup+0x36/0x70 [ 1491.232386] kstrdup_const+0x53/0x80 [ 1491.233164] __kernfs_new_node+0x9d/0x850 [ 1491.234010] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1491.234994] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1491.235967] ? pcpu_alloc+0x12a/0x12f0 [ 1491.236798] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1491.237863] kernfs_create_dir_ns+0x9c/0x230 [ 1491.238767] cgroup_mkdir+0x318/0xfc0 [ 1491.239560] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1491.240543] kernfs_iop_mkdir+0x14d/0x1e0 [ 1491.241398] vfs_mkdir+0x41f/0x660 [ 1491.242133] do_mkdirat+0x145/0x2a0 [ 1491.242865] ? user_path_create+0xf0/0xf0 [ 1491.243720] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1491.244790] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1491.245828] do_syscall_64+0x33/0x40 [ 1491.246576] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1491.247599] RIP: 0033:0x7fae7cd32b19 [ 1491.248348] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 19:07:34 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x10801, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000140)) r1 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r2, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r1, r3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 1491.252021] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1491.253722] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1491.255216] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1491.256732] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1491.258277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1491.259793] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 19:07:34 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 23) [ 1491.472481] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1491.474461] EXT4-fs (loop2): group descriptors corrupted! [ 1491.629533] FAULT_INJECTION: forcing a failure. [ 1491.629533] name failslab, interval 1, probability 0, space 0, times 0 [ 1491.632369] CPU: 0 PID: 13342 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1491.634004] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1491.635720] Call Trace: [ 1491.636280] dump_stack+0x107/0x167 [ 1491.637063] should_fail.cold+0x5/0xa [ 1491.637864] ? create_object.isra.0+0x3a/0xa20 [ 1491.638816] should_failslab+0x5/0x20 [ 1491.639617] kmem_cache_alloc+0x5b/0x360 [ 1491.640463] ? pagecache_get_page+0x243/0xc80 [ 1491.641412] create_object.isra.0+0x3a/0xa20 [ 1491.642333] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1491.643399] kmem_cache_alloc+0x159/0x360 [ 1491.644279] ext4_free_blocks+0x915/0x20f0 [ 1491.645206] ? ext4_mb_new_blocks+0x4890/0x4890 [ 1491.646176] ? __ext4_handle_dirty_metadata+0x1f3/0x720 [ 1491.647304] ? ext4_ind_truncate_ensure_credits+0x57f/0x780 [ 1491.648514] ext4_free_branches+0x2fc/0x680 [ 1491.649454] ext4_ind_truncate+0x692/0x900 [ 1491.650346] ? ext4_ind_trans_blocks+0x80/0x80 [ 1491.651312] ? ext4_mb_mark_bb+0xd50/0xd50 [ 1491.652221] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1491.653298] ? __ext4_journal_start_sb+0x214/0x430 [ 1491.654315] ? __ext4_journal_start_sb+0x1db/0x430 [ 1491.655353] ext4_truncate+0x7b8/0x12b0 [ 1491.656186] ? ext4_punch_hole+0x1110/0x1110 [ 1491.657125] ext4_setattr+0x14c7/0x22c0 [ 1491.657952] ? current_time+0x1e6/0x2c0 [ 1491.658797] ? ext4_journalled_write_end+0x1240/0x1240 [ 1491.659878] notify_change+0xba2/0x1080 [ 1491.660705] ? mark_lock+0x2190/0x2df0 [ 1491.661531] do_truncate+0x134/0x1f0 [ 1491.662302] ? file_open_root+0x440/0x440 [ 1491.663160] ? security_file_open+0x20b/0x500 [ 1491.664117] ? may_open+0x1e4/0x400 [ 1491.664909] path_openat+0x1d51/0x26d0 [ 1491.665744] ? path_lookupat+0x860/0x860 [ 1491.666592] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1491.667670] ? SOFTIRQ_verbose+0x10/0x10 [ 1491.668511] ? lock_acquire+0x197/0x490 [ 1491.669367] do_filp_open+0x17e/0x3d0 [ 1491.670158] ? may_open_dev+0xf0/0xf0 [ 1491.670956] ? __alloc_fd+0x2a5/0x620 [ 1491.671760] ? rwlock_bug.part.0+0x90/0x90 [ 1491.672657] ? _raw_spin_unlock+0x1a/0x30 [ 1491.673534] ? __alloc_fd+0x2a5/0x620 [ 1491.674354] do_sys_openat2+0x171/0x420 [ 1491.675192] ? build_open_flags+0x690/0x690 [ 1491.676097] ? wait_for_completion+0x270/0x270 [ 1491.677073] ? rcu_read_lock_any_held+0x75/0xa0 [ 1491.678045] ? vfs_write+0x354/0xa30 [ 1491.678845] __x64_sys_creat+0xc9/0x120 [ 1491.679676] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 1491.680726] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1491.681830] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1491.682907] ? trace_hardirqs_on+0x5b/0x180 [ 1491.683811] do_syscall_64+0x33/0x40 [ 1491.684593] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1491.685665] RIP: 0033:0x7f8428451b19 [ 1491.686475] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1491.690302] RSP: 002b:00007f84259a6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1491.691875] RAX: ffffffffffffffda RBX: 00007f8428565020 RCX: 00007f8428451b19 [ 1491.693350] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000340 [ 1491.694814] RBP: 00007f84259a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1491.696285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1491.697764] R13: 00007ffc9c2fdc9f R14: 00007f84259a6300 R15: 0000000000022000 19:07:49 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) (fail_nth: 24) 19:07:49 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6332f9bfc45e88bc}, 0xff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, 0x0, 0x1, 0x0, 0x0, {0x4}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x20}}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) r7 = dup(r6) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r7, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 19:07:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb", 0xd2}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:07:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 15) 19:07:49 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0xe, 0x0, @private2}, 0x1c) 19:07:49 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x5, 0x0, @private2}, 0x1c) 19:07:49 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005000000", 0xc, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:07:49 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x8, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') sendmsg$nl_xfrm(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@getspdinfo={0x14, 0x25, 0x2, 0x70bd2a, 0x25dfdbfc, 0x3, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x840}, 0x44044004) clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r5, &(0x7f0000000fc0)=[{{&(0x7f00000002c0)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x4004810) ioctl$AUTOFS_IOC_EXPIRE(r5, 0x810c9365, &(0x7f0000000300)={{0x86, 0x7ff}, 0x100, './file0\x00'}) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r6, &(0x7f0000000fc0)=[{{&(0x7f00000002c0)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x4004810) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) [ 1506.180951] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (ad4c0000) [ 1506.186354] FAULT_INJECTION: forcing a failure. [ 1506.186354] name failslab, interval 1, probability 0, space 0, times 0 [ 1506.189165] CPU: 0 PID: 13358 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1506.190560] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1506.192372] Call Trace: [ 1506.192917] dump_stack+0x107/0x167 [ 1506.193670] should_fail.cold+0x5/0xa [ 1506.194440] ? create_object.isra.0+0x3a/0xa20 [ 1506.195360] should_failslab+0x5/0x20 [ 1506.196132] kmem_cache_alloc+0x5b/0x360 [ 1506.196949] ? lock_acquire+0x197/0x490 [ 1506.197763] create_object.isra.0+0x3a/0xa20 [ 1506.198647] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1506.199676] __kmalloc_track_caller+0x177/0x3c0 [ 1506.200615] ? kstrdup_const+0x53/0x80 [ 1506.201435] kstrdup+0x36/0x70 [ 1506.202087] kstrdup_const+0x53/0x80 [ 1506.202845] __kernfs_new_node+0x9d/0x850 [ 1506.203692] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1506.204657] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1506.205640] ? pcpu_alloc+0x12a/0x12f0 [ 1506.206443] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1506.207489] kernfs_create_dir_ns+0x9c/0x230 [ 1506.208383] cgroup_mkdir+0x318/0xfc0 [ 1506.209165] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1506.210116] kernfs_iop_mkdir+0x14d/0x1e0 [ 1506.210972] vfs_mkdir+0x41f/0x660 [ 1506.211690] do_mkdirat+0x145/0x2a0 [ 1506.212424] ? user_path_create+0xf0/0xf0 [ 1506.213284] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1506.214356] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1506.215396] do_syscall_64+0x33/0x40 [ 1506.216152] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1506.217192] RIP: 0033:0x7fae7cd32b19 [ 1506.217942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1506.221641] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1506.223175] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1506.224621] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1506.226091] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1506.227540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1506.228997] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 [ 1506.239752] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1506.293704] FAULT_INJECTION: forcing a failure. [ 1506.293704] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1506.296160] CPU: 1 PID: 13360 Comm: syz-executor.4 Not tainted 5.10.159 #1 [ 1506.297593] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1506.299283] Call Trace: [ 1506.299823] dump_stack+0x107/0x167 [ 1506.300568] should_fail.cold+0x5/0xa [ 1506.301359] _copy_to_user+0x2e/0x180 [ 1506.302146] simple_read_from_buffer+0xcc/0x160 [ 1506.303102] proc_fail_nth_read+0x198/0x230 [ 1506.303981] ? proc_sessionid_read+0x230/0x230 [ 1506.304908] ? security_file_permission+0x24e/0x570 [ 1506.305951] ? perf_trace_initcall_start+0x101/0x380 [ 1506.307004] ? proc_sessionid_read+0x230/0x230 [ 1506.307931] vfs_read+0x228/0x580 [ 1506.308643] ksys_read+0x12d/0x260 [ 1506.309372] ? vfs_write+0xa30/0xa30 [ 1506.310130] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1506.311198] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1506.312254] do_syscall_64+0x33/0x40 [ 1506.313015] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1506.314059] RIP: 0033:0x7f842840469c [ 1506.314820] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1506.318573] RSP: 002b:00007f84259c7170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1506.320125] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007f842840469c [ 1506.321584] RDX: 000000000000000f RSI: 00007f84259c71e0 RDI: 0000000000000005 [ 1506.323037] RBP: 00007f84259c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 1506.324470] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1506.325933] R13: 00007ffc9c2fdc9f R14: 00007f84259c7300 R15: 0000000000022000 19:07:49 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000f256bcd97d4240ebf0300a003ec517b121b66ceaf65946de73018975a28a3770f47c701d70504000000000000006b86cfba5e16d772d269221414b9da9406ad12e2e4717e7103e052a894962ae411ca375d3c2549f4fb0d5654fc9e641f5dd20803928b69bd2138eb5d09fabdc96bc3cb22ad151e1ee50a0c03b4c1688e830a1d552f5590a74a6699f38857a60f94f8a36f1a8a7da7a6d6b174e55a559ebf302fa04f7096fbd8f401ba8c78978d97cd20f63b6d348978bca796f852b942873fab9777682e5e914b6c9eaf345dc93178f3f2dd287b89820000000000000000000000ec00001c9e746babb574b1fa04abe51dd4000320ee5c3b4c871dd965c387dd3ab0c12e7af8ce58c8a277f3acd07a96195163b040e7ef0ed30ab6abeaebb9086af9d225f218f31179e4b984391e7538b4ee3c886f3ff0581f8ce0ce3bfff615000000000000000000"]) 19:07:49 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6332f9bfc45e88bc}, 0xff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, 0x0, 0x1, 0x0, 0x0, {0x4}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x20}}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) r7 = dup(r6) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r7, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) 19:07:49 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, 0x0, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x121}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x4000800) 19:07:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 16) 19:07:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb", 0xd2}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:07:50 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x0) [ 1506.671916] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (ad4c0000) [ 1506.693914] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 1506.732210] FAULT_INJECTION: forcing a failure. [ 1506.732210] name failslab, interval 1, probability 0, space 0, times 0 [ 1506.735070] CPU: 1 PID: 13489 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1506.736502] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1506.738254] Call Trace: [ 1506.738823] dump_stack+0x107/0x167 [ 1506.739581] should_fail.cold+0x5/0xa [ 1506.740401] ? __kernfs_new_node+0xd4/0x850 [ 1506.741338] should_failslab+0x5/0x20 [ 1506.742133] kmem_cache_alloc+0x5b/0x360 [ 1506.742984] __kernfs_new_node+0xd4/0x850 [ 1506.743858] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1506.744849] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1506.745913] ? pcpu_alloc+0x12a/0x12f0 [ 1506.746735] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1506.747832] kernfs_create_dir_ns+0x9c/0x230 [ 1506.748758] cgroup_mkdir+0x318/0xfc0 [ 1506.749584] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1506.750575] kernfs_iop_mkdir+0x14d/0x1e0 [ 1506.751444] vfs_mkdir+0x41f/0x660 [ 1506.752203] do_mkdirat+0x145/0x2a0 [ 1506.752976] ? user_path_create+0xf0/0xf0 [ 1506.753853] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1506.754938] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1506.756010] do_syscall_64+0x33/0x40 [ 1506.756799] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1506.757882] RIP: 0033:0x7fae7cd32b19 [ 1506.758647] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1506.762458] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1506.764040] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1506.765529] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1506.767029] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1506.768500] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1506.770013] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 19:07:50 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400", 0x6, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:07:50 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6332f9bfc45e88bc}, 0xff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, 0x0, 0x1, 0x0, 0x0, {0x4}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x20}}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) dup(r6) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 1507.067188] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (ad4c0000) 19:08:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 17) 19:08:05 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x6, 0x0, @private2}, 0x1c) 19:08:05 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb", 0xd2}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x17, 0x0) 19:08:05 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6332f9bfc45e88bc}, 0xff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, 0x0, 0x1, 0x0, 0x0, {0x4}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x20}}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) dup(r6) 19:08:05 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400", 0x6, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:08:05 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x2) 19:08:05 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x4040, 0x7e) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x7, 0x10000, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xd, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r3, &(0x7f0000000a00)=ANY=[], 0x98a) readv(r3, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) readv(0xffffffffffffffff, 0x0, 0x0) acct(&(0x7f0000000040)='./file0\x00') unshare(0x48020200) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r5) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) recvmsg$unix(r4, &(0x7f0000000440)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000140)=""/151, 0x97}, {&(0x7f0000000200)=""/176, 0xb0}, {&(0x7f0000000300)=""/100, 0x64}], 0x3, &(0x7f00000003c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10041) 19:08:05 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x10, 0x0, @private2}, 0x1c) [ 1521.616130] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1521.618335] EXT4-fs (loop2): group descriptors corrupted! [ 1521.655391] FAULT_INJECTION: forcing a failure. [ 1521.655391] name failslab, interval 1, probability 0, space 0, times 0 [ 1521.658324] CPU: 1 PID: 13619 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1521.659675] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1521.661318] Call Trace: [ 1521.661838] dump_stack+0x107/0x167 [ 1521.662572] should_fail.cold+0x5/0xa [ 1521.663327] ? create_object.isra.0+0x3a/0xa20 [ 1521.664232] should_failslab+0x5/0x20 [ 1521.664988] kmem_cache_alloc+0x5b/0x360 [ 1521.665829] create_object.isra.0+0x3a/0xa20 [ 1521.666698] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1521.667700] kmem_cache_alloc+0x159/0x360 [ 1521.668531] __kernfs_new_node+0xd4/0x850 [ 1521.669382] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1521.670310] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1521.671342] ? trace_hardirqs_on+0x5b/0x180 [ 1521.672190] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1521.673290] ? cgroup_rstat_init+0x114/0x1f0 [ 1521.674161] kernfs_create_dir_ns+0x9c/0x230 [ 1521.675037] cgroup_mkdir+0x318/0xfc0 [ 1521.675799] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1521.676741] kernfs_iop_mkdir+0x14d/0x1e0 [ 1521.677591] vfs_mkdir+0x41f/0x660 [ 1521.678316] do_mkdirat+0x145/0x2a0 [ 1521.679037] ? user_path_create+0xf0/0xf0 [ 1521.679864] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1521.680912] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1521.681968] do_syscall_64+0x33/0x40 [ 1521.682715] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1521.683765] RIP: 0033:0x7fae7cd32b19 [ 1521.684507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1521.688185] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1521.689724] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1521.691149] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1521.692567] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1521.693994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1521.695403] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 19:08:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 18) 19:08:05 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400", 0x6, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000f256bcd97d4240ebf0300a003ec517b121b66ceaf65946de73018975a28a3770f47c701d70504000000000000006b86cfba5e16d772d269221414b9da9406ad12e2e4717e7103e052a894962ae411ca375d3c2549f4fb0d5654fc9e641f5dd20803928b69bd2138eb5d09fabdc96bc3cb22ad151e1ee50a0c03b4c1688e830a1d552f5590a74a6699f38857a60f94f8a36f1a8a7da7a6d6b174e55a559ebf302fa04f7096fbd8f401ba8c78978d97cd20f63b6d348978bca796f852b942873fab9777682e5e914b6c9eaf345dc93178f3f2dd287b89820000000000000000000000ec00001c9e746babb574b1fa04abe51dd4000320ee5c3b4c871dd965c387dd3ab0c12e7af8ce58c8a277f3acd07a96195163b040e7ef0ed30ab6abeaebb9086af9d225f218f31179e4b984391e7538b4ee3c886f3ff0581f8ce0ce3bfff615000000000000000000"]) 19:08:05 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x0, 0x0) [ 1521.899282] Process accounting resumed 19:08:05 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6332f9bfc45e88bc}, 0xff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, 0x0, 0x1, 0x0, 0x0, {0x4}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x20}}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) dup(r6) 19:08:05 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x3) [ 1521.972928] FAULT_INJECTION: forcing a failure. [ 1521.972928] name failslab, interval 1, probability 0, space 0, times 0 [ 1521.976346] CPU: 1 PID: 13739 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1521.977774] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1521.979453] Call Trace: [ 1521.980020] dump_stack+0x107/0x167 [ 1521.980765] should_fail.cold+0x5/0xa [ 1521.981593] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1521.982769] should_failslab+0x5/0x20 [ 1521.983542] kmem_cache_alloc+0x5b/0x360 [ 1521.984391] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1521.985559] idr_get_free+0x4b5/0x8f0 [ 1521.986361] idr_alloc_u32+0x170/0x2d0 [ 1521.987167] ? __fprop_inc_percpu_max+0x130/0x130 [ 1521.988155] ? lock_acquire+0x197/0x490 [ 1521.988980] ? __kernfs_new_node+0xff/0x850 [ 1521.989885] idr_alloc_cyclic+0x102/0x230 [ 1521.990734] ? idr_alloc+0x130/0x130 [ 1521.991496] ? rwlock_bug.part.0+0x90/0x90 [ 1521.992369] __kernfs_new_node+0x117/0x850 [ 1521.993258] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1521.994225] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1521.995204] ? pcpu_alloc+0x12a/0x12f0 [ 1521.996000] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1521.997065] kernfs_create_dir_ns+0x9c/0x230 [ 1521.997974] cgroup_mkdir+0x318/0xfc0 [ 1521.998759] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1521.999718] kernfs_iop_mkdir+0x14d/0x1e0 [ 1522.000570] vfs_mkdir+0x41f/0x660 [ 1522.001301] do_mkdirat+0x145/0x2a0 [ 1522.002050] ? user_path_create+0xf0/0xf0 [ 1522.002893] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1522.003966] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1522.005011] do_syscall_64+0x33/0x40 [ 1522.005787] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1522.006815] RIP: 0033:0x7fae7cd32b19 [ 1522.007580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1522.011277] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1522.012809] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1522.014250] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1522.015681] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1522.017106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1522.018566] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 [ 1522.039619] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1522.041627] EXT4-fs (loop2): group descriptors corrupted! 19:08:05 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0300000024000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) [ 1522.179316] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (ad4c0000) [ 1522.243659] Process accounting resumed [ 1522.296330] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1522.298472] EXT4-fs (loop2): group descriptors corrupted! 19:08:05 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000140)) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:08:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 19) 19:08:05 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x4) 19:08:05 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0300000024000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) [ 1522.535482] FAULT_INJECTION: forcing a failure. [ 1522.535482] name failslab, interval 1, probability 0, space 0, times 0 [ 1522.537596] CPU: 1 PID: 13868 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1522.538697] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1522.540026] Call Trace: [ 1522.540457] dump_stack+0x107/0x167 [ 1522.541054] should_fail.cold+0x5/0xa [ 1522.541666] ? create_object.isra.0+0x3a/0xa20 [ 1522.542403] should_failslab+0x5/0x20 [ 1522.543015] kmem_cache_alloc+0x5b/0x360 [ 1522.543657] create_object.isra.0+0x3a/0xa20 [ 1522.544352] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1522.545155] kmem_cache_alloc+0x159/0x360 [ 1522.545844] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1522.546752] idr_get_free+0x4b5/0x8f0 [ 1522.547393] idr_alloc_u32+0x170/0x2d0 [ 1522.548033] ? __fprop_inc_percpu_max+0x130/0x130 [ 1522.548813] ? lock_acquire+0x197/0x490 [ 1522.549479] ? __kernfs_new_node+0xff/0x850 [ 1522.550194] idr_alloc_cyclic+0x102/0x230 [ 1522.550868] ? idr_alloc+0x130/0x130 [ 1522.551468] ? rwlock_bug.part.0+0x90/0x90 [ 1522.552163] __kernfs_new_node+0x117/0x850 [ 1522.552842] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1522.553626] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1522.554399] ? pcpu_alloc+0x12a/0x12f0 [ 1522.555045] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1522.555884] kernfs_create_dir_ns+0x9c/0x230 [ 1522.556607] cgroup_mkdir+0x318/0xfc0 [ 1522.557242] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1522.558000] kernfs_iop_mkdir+0x14d/0x1e0 [ 1522.558670] vfs_mkdir+0x41f/0x660 [ 1522.559243] do_mkdirat+0x145/0x2a0 [ 1522.559829] ? user_path_create+0xf0/0xf0 [ 1522.560495] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1522.561362] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1522.562189] do_syscall_64+0x33/0x40 [ 1522.562780] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1522.563594] RIP: 0033:0x7fae7cd32b19 [ 1522.564187] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1522.567116] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1522.568332] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1522.569489] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1522.570627] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1522.571762] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1522.572893] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 [ 1522.599640] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1522.601217] EXT4-fs (loop2): group descriptors corrupted! 19:08:19 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 20) 19:08:19 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6332f9bfc45e88bc}, 0xff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, 0x0, 0x1, 0x0, 0x0, {0x4}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x20}}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) socket$inet6_udplite(0xa, 0x2, 0x88) 19:08:19 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0300000024000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:08:19 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x60, 0x0, @private2}, 0x1c) 19:08:19 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x0, 0x0) 19:08:19 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x7, 0x0, @private2}, 0x1c) 19:08:19 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) socketpair(0x5, 0x800, 0x6, &(0x7f0000000540)={0xffffffffffffffff}) fdatasync(r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r3) preadv2(r3, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/132, 0x84}, {&(0x7f0000000200)=""/83, 0x53}, {&(0x7f00000000c0)=""/24, 0x18}, {&(0x7f0000000280)=""/226, 0xe2}, {&(0x7f0000000380)=""/176, 0xb0}, {&(0x7f0000000440)=""/111, 0x6f}], 0x6, 0x20200000, 0x80000001, 0x1a) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') open(&(0x7f0000000080)='./file0\x00', 0x100002, 0x1) clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:08:19 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x5) [ 1535.784123] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (ad4c0000) [ 1535.902340] FAULT_INJECTION: forcing a failure. [ 1535.902340] name failslab, interval 1, probability 0, space 0, times 0 [ 1535.905253] CPU: 1 PID: 13889 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1535.906914] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1535.908883] Call Trace: [ 1535.909541] dump_stack+0x107/0x167 [ 1535.910418] should_fail.cold+0x5/0xa [ 1535.911333] ? selinux_kernfs_init_security+0x132/0x4c0 [ 1535.912604] should_failslab+0x5/0x20 [ 1535.913594] __kmalloc+0x72/0x3f0 [ 1535.914494] selinux_kernfs_init_security+0x132/0x4c0 [ 1535.915801] ? selinux_file_mprotect+0x600/0x600 [ 1535.917004] ? find_held_lock+0x2c/0x110 [ 1535.918060] ? __kernfs_new_node+0x2ad/0x850 [ 1535.919180] ? lock_downgrade+0x6d0/0x6d0 [ 1535.920264] ? rwlock_bug.part.0+0x90/0x90 [ 1535.921390] security_kernfs_init_security+0x4e/0xb0 [ 1535.922713] __kernfs_new_node+0x531/0x850 [ 1535.923803] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1535.925030] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1535.926285] ? pcpu_alloc+0x12a/0x12f0 [ 1535.927298] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1535.928634] kernfs_create_dir_ns+0x9c/0x230 [ 1535.929792] cgroup_mkdir+0x318/0xfc0 [ 1535.930772] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1535.931989] kernfs_iop_mkdir+0x14d/0x1e0 [ 1535.933045] vfs_mkdir+0x41f/0x660 [ 1535.933987] do_mkdirat+0x145/0x2a0 [ 1535.934915] ? user_path_create+0xf0/0xf0 [ 1535.935976] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1535.937310] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1535.938649] do_syscall_64+0x33/0x40 [ 1535.939604] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1535.940916] RIP: 0033:0x7fae7cd32b19 [ 1535.941899] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1535.946583] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1535.948501] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1535.950314] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1535.952113] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1535.953939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1535.955738] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 [ 1535.963419] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 1535.965960] EXT4-fs (loop2): group descriptors corrupted! 19:08:19 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6332f9bfc45e88bc}, 0xff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, 0x0, 0x1, 0x0, 0x0, {0x4}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x20}}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r5}) 19:08:19 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005", 0x9}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000f256bcd97d4240ebf0300a003ec517b121b66ceaf65946de73018975a28a3770f47c701d70504000000000000006b86cfba5e16d772d269221414b9da9406ad12e2e4717e7103e052a894962ae411ca375d3c2549f4fb0d5654fc9e641f5dd20803928b69bd2138eb5d09fabdc96bc3cb22ad151e1ee50a0c03b4c1688e830a1d552f5590a74a6699f38857a60f94f8a36f1a8a7da7a6d6b174e55a559ebf302fa04f7096fbd8f401ba8c78978d97cd20f63b6d348978bca796f852b942873fab9777682e5e914b6c9eaf345dc93178f3f2dd287b89820000000000000000000000ec00001c9e746babb574b1fa04abe51dd4000320ee5c3b4c871dd965c387dd3ab0c12e7af8ce58c8a277f3acd07a96195163b040e7ef0ed30ab6abeaebb9086af9d225f218f31179e4b984391e7538b4ee3c886f3ff0581f8ce0ce3bfff615000000000000000000"]) 19:08:19 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x6) 19:08:19 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x30b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000fc0)=[{{&(0x7f00000002c0)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x4004810) fcntl$dupfd(r1, 0x406, r4) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r5) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:08:19 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 21) [ 1536.226442] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (ad4c0000) 19:08:19 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) process_madvise(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000280)="99eafc71f18f19610d95c9d3b238d45f6818da037f37f6840a5332fd19e2ed2a7fe2bf13cd82ea6068caa0449787c12d49399448ad08ee95e11ca67c0adb46b61d60b8c7b29149e01df9307584e2074210e4ccaad5d7ca7469345d37ea24b09dbc2feae10de3e9691c7b94704906d52dc182daf1a0e3b391e33e54cb0e3babfb7fdca5bd48cf2719d30d5c870cd162ee2120fe25a450df33f89c578c20c00a2e39ae3437b102785208f9932a8dd112fdbb1837b8a0d58a3499c7d2996cab83ef3040b352f7f9c21e02cb21c43fe599e584cb53", 0xd3}, {&(0x7f0000000140)="958719adced6c44fe6db1b73e805e6ebaae44199f2395f6290f68bb729eb964798511f4271b9", 0x26}, {&(0x7f0000000180)="40a384a2d6574daf0c1a5c5a5bdca2831c", 0x11}], 0x3, 0x0, 0x0) 19:08:19 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6332f9bfc45e88bc}, 0xff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, 0x0, 0x1, 0x0, 0x0, {0x4}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x20}}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) [ 1536.393111] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1536.395312] EXT4-fs (loop2): group descriptors corrupted! [ 1536.449820] FAULT_INJECTION: forcing a failure. [ 1536.449820] name failslab, interval 1, probability 0, space 0, times 0 [ 1536.453191] CPU: 0 PID: 14017 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1536.454723] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1536.456466] Call Trace: [ 1536.457040] dump_stack+0x107/0x167 [ 1536.457835] should_fail.cold+0x5/0xa [ 1536.458644] ? create_object.isra.0+0x3a/0xa20 [ 1536.459606] should_failslab+0x5/0x20 [ 1536.460397] kmem_cache_alloc+0x5b/0x360 [ 1536.461240] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1536.462252] create_object.isra.0+0x3a/0xa20 [ 1536.463165] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1536.464217] __kmalloc+0x16e/0x3f0 [ 1536.464965] selinux_kernfs_init_security+0x132/0x4c0 [ 1536.466040] ? selinux_file_mprotect+0x600/0x600 [ 1536.467021] ? find_held_lock+0x2c/0x110 [ 1536.467874] ? __kernfs_new_node+0x2ad/0x850 [ 1536.468783] ? lock_downgrade+0x6d0/0x6d0 [ 1536.469664] ? rwlock_bug.part.0+0x90/0x90 [ 1536.470553] security_kernfs_init_security+0x4e/0xb0 [ 1536.471603] __kernfs_new_node+0x531/0x850 [ 1536.472480] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1536.473470] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1536.474456] ? pcpu_alloc+0x12a/0x12f0 [ 1536.475266] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1536.476335] kernfs_create_dir_ns+0x9c/0x230 [ 1536.477247] cgroup_mkdir+0x318/0xfc0 [ 1536.478046] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1536.479021] kernfs_iop_mkdir+0x14d/0x1e0 [ 1536.479877] vfs_mkdir+0x41f/0x660 [ 1536.480614] do_mkdirat+0x145/0x2a0 [ 1536.481380] ? user_path_create+0xf0/0xf0 [ 1536.482242] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1536.483318] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1536.484371] do_syscall_64+0x33/0x40 [ 1536.485129] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1536.486185] RIP: 0033:0x7fae7cd32b19 [ 1536.486953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1536.490708] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1536.492256] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1536.493716] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1536.495164] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1536.496604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1536.498044] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 19:08:19 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x7) 19:08:20 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r3, &(0x7f0000000fc0)=[{{&(0x7f00000002c0)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x4004810) r4 = gettid() r5 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) r6 = getegid() keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000080)='rxrpc_s\x00', &(0x7f0000000300)=@keyring={'key_or_keyring:', r5}) keyctl$chown(0x4, r5, 0xee01, r6) sendmsg$netlink(0xffffffffffffffff, &(0x7f000000c880)={&(0x7f0000000140)=@proc={0x10, 0x0, 0x25dfdbfb, 0x100}, 0xc, &(0x7f000000c200)=[{&(0x7f00000001c0)={0x590, 0x41, 0x400, 0x70bd2a, 0x25dfdbfc, "", [@nested={0x42, 0x31, 0x0, 0x1, [@generic="3bef70604693f19cc7098ddec2a0f34a9675da27b166f38d337f66125c266f3e70b5eb32277f66b71502daf374a15923c836ac3e0a4aa3b8a403f9311dbc"]}, @typed={0x8, 0x44, 0x0, 0x0, @pid}, @generic="14ac20f0d1d4ec65a81b8daaeb204cdffcfb227de8c708d0ac441e3278ba5cb4eb60d5605c52d7bfcc75198185e5269aed1bd70c48a0d7a8ffc7d6efff6835caee484355c74e18bf71658b45d0dd01a941926662a04b452d5949206e18e3757dee6c57001a63964c208ca498bb6dab7b067c678ec7f7e780c17dc23abc7bdeee1ce37aea8fe4c29b22b45715aa58f3", @generic="533ce3b7ecd92f09043b9c5e29032f8b5ffdaad88c069a24925a5c0c97d1937799186491c8bcd3579f8239e6bd87a834ebe75b8163b7f48d9380e7777eb69a041b4b1590e1ea6f6fd45f4ac0f5f35108058f630c15fada9a41c5d44a2b8f9ab159296fe1de6fce57", @nested={0x1ea, 0x47, 0x0, 0x1, [@generic="8d049c67f99abe939033b564d1025191131142a8099dc9a82ccb103fa142a57e3f602be4ae1dcc28f785a388defe3f641722631c609ba1776044bf8de4bcb9781b5f4403a0e659f73ce3b184eec6ec3bb90d9e8dfbece8ddf46824512182d761ca7130e14e2d30a57f9c21bb322c25fc6e2ac5bfd29d82d8bc8ce3265221cedcfa3144dd86683f9d11d818b3cf41635fdf94a2ec80dcc043119ee3a466dd8c76fe13a40e01804787b4fe438ef253c0cb3d547a53858d5e7d905e675442cbddc9b99525bd90a53f137e26f0d2b94a23ace8afb0198574b7da4838a8a7de266e597345abbe43a5c8771b99", @typed={0x8, 0x6f, 0x0, 0x0, @uid}, @typed={0xf3, 0x0, 0x0, 0x0, @binary="e2238b814f32ddd3c16ff984c0e9e33815aeb78350b25df4cff028938325417c351a209983f31b5a5cd6729b3d488cd8305c21be82d299503657237fa26db94f28a375dc59040d30fb06172cb58671546e08c964f8bfd9dbe8e3ff7250ec5af22e1b80fce9ea3e0318907ae0f87393f1f99b16efb0abe66d8a9dafc8d584fdfa2196b2ea30ad12505688e0669f66cb8fb2c9eb24647fed2a1d53a9743e2fe99436d6976c2b87837f6eb4deb418a6253f744d6fd510e8fe0093dbe41f265e3bc38c5b8bf452a09b7ec1228d69b6d495556cd804fe59090d7f641f2d841b6094b856785eaee20ae847d554d6194333fd"}]}, @generic="687cf2aed8b03f", @nested={0x215, 0x4e, 0x0, 0x1, [@generic="5f5f88486de5e470b70b68c6b0936dc68a459950cacea7858217ce10a85146d8f6b7f7903b3b57d05be56dce1faaf50e2f9c0a1e27fca68799d215", @generic="36728166a204711a3ab6a71144529fcbc38c39cd918689c2e6821a0b0d025ca38314af10b1f22e00716e7bace197080a2b0f161e68d772d25611bd7a0b114687e5ebe26f56b940b7733cf6f7edd1946c47936b92eb8e2cb8ca6cd689b2606bd60712bbcec55fb1c1f50047c74e7ab4b424ee50ff6f4bd34b3ce3773595e28581d84f67c84578800a9f878cd0d2d909db1cd2fba61c8515f9b44b6da6eadae5cec375bd1029823d212e548b03bde38a2fce89521aa83687be316d9a6ac03fb63f84f9db5a031b7c", @typed={0x8, 0x2b, 0x0, 0x0, @ipv4=@private=0xa010102}, @generic="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", @typed={0x8, 0x64, 0x0, 0x0, @pid}]}, @generic="cdb186caac38be588bc59f7bb68526bd55a389d7e8a110aa0ba0f63b5afe5337883879a79375682c44ba9a0d288fdeb5"]}, 0x590}, {&(0x7f0000005400)={0x14f8, 0x32, 0x300, 0x70bd28, 0x25dfdbfc, "", [@nested={0x28, 0x3, 0x0, 0x1, [@typed={0x8, 0xd, 0x0, 0x0, @fd}, @typed={0x8, 0x9, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @typed={0x14, 0x67, 0x0, 0x0, @ipv6=@loopback}]}, @nested={0x10b, 0x12, 0x0, 0x1, [@generic="ce90242939a0e0349829223291ae0c16de3caf5bf2d40c743f8e103140f686e834adadb59519b2df83d6d88dd841189a82315e7a394a7e9006199ef5de754e9a0816859d39c14b49d73cb4545701311445ac649dd1a25f213d898890c2ed271417b924ed0de4eec23ef39827574f2f047b503e757a70f46002ada6467b520e431bea406a217048a5e45df68ef85c234926f9ee22c2ba6b82ee228be531d7849f77dc8cf6e8cfc82f62eea61970e4aa74f55e4ef8db915cbc9bdd0842ed44a8468fa7e0dd7da3670956f93e7fc7fc01812da7e2c66640906724455d49c8d2c36b119b4d2a6c4d3a535757c2dcbc20784788af24", @typed={0xc, 0x51, 0x0, 0x0, @u64=0x8}, @typed={0x8, 0xa, 0x0, 0x0, @fd}]}, @generic="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", @typed={0x8, 0x79, 0x0, 0x0, @pid}, @generic="6966469376f21c1b2a94d7cf99e89918aa2a76cd3fbb11d36b9f02410777af81cf511c2ca45c1f0c2ec1b0682152645d15c6c47d82545c610ffb4e", @generic="717eb5a75a8dcad6a56a13cff1edfc2bb3caadf96d93b82a96944ab6b679c78209622390d1104ff26e4a086dc5b603b514d6a9d27ee2b72c9319f47f024fa434836352a1da1ad2d089aaf49e19bd6214cb4f1562f522c1b2b60e8e4206976d15385751e73c509b2c0b8bf6a0cbe13db029b2e1d82e0380af10624140ef15966c3d8fccc5519cc5f17a93a9e69bf7dd4e30787dbffbae9303865a0ea6c03d", @nested={0xb9, 0x32, 0x0, 0x1, [@typed={0x8, 0x81, 0x0, 0x0, @fd=r0}, @generic="d68b6961dd58b99945bc3423eff1d713703e0840d38aadb2ae2eeeb47a7fba260034800349e9040f4cafe27c626e903b93002d25a88908ab6a907b5653bf6aa31e254d1a14bd540ecc246a01c8625e943ffa2901fb49917c1ad48b1fff13e5225199a6852b629d535ccbac9283bfb566870fb0ec0a9858e61d4c3782ef82b4d216d3aa677bec909b59a9e5a1e4c0d47013544266267c0ee2dd77cda306", @typed={0x8, 0x30, 0x0, 0x0, @u32=0xe79}, @typed={0x8, 0x5b, 0x0, 0x0, @u32=0x8}]}, @nested={0x212, 0x60, 0x0, 0x1, [@generic="148f62cca18c7727d110c71aa10abb258d6ef04bfab4e24156fcf76525a9dda9b4d9f0d2fde1f8ca17dce931758712cbd6672b504cc99de117aa8ee0fce613807c3debd09022c5aa8973843da821475b1d0e21f35dcfdc551197dfe4e1b8fb63769463491d32530721658b78cf8bbb7597b30223c423bb76f128e2ac5ea1a99ab08bc54f5b38f1ff20786e45339a6877d556d24fc4ee", @typed={0x8, 0x39, 0x0, 0x0, @pid}, @typed={0x8, 0x3a, 0x0, 0x0, @uid=0xffffffffffffffff}, @generic="264ca1c001d7841288cd50eeb1206e6223391c36800fa33decc4ee8d9784d25a6ddd5568fc68529bf705a2c5aaccfec62a01facb0d8e60ebe77bc0556feb48cb338067e638a3f416115aa092e3e6c9544d41227cc0208fc6cc06942a6c42e4d6f75df8", @typed={0x8, 0x95, 0x0, 0x0, @ipv4=@multicast1}, @typed={0x7, 0x13, 0x0, 0x0, @str='%:\x00'}, @generic="957f1ec8d440c2d51517012b4d4d12d111da41f6b0130a6d73e4200e89b49c436ad3335fc85862a0b4aaf7791bbe57c4f290869028b3a13f23fc95382cec5784fad0bee7449acb190011735b299bdbc59acf58d911b40167be5768ac69438dcd2ec4e3b8983bfad535959e51192f34cee9ba5f22244765df04a4e8637a6389ff4cba7bfc2db36a31c5bc2390f0bfe64ef298d0dcdc1d131b2236c581cd5c30aa119e867d40086222a4d16e5300a602a2ed7dfe9558ff91575e8286e06881dbbe7b6b834062dda1a66d384ee8537db9e30b7002a1f5fa3bc988ae1422b135d00387b543dbe872a239e6eb85f546", @typed={0x8, 0x88, 0x0, 0x0, @pid}]}]}, 0x14f8}, {&(0x7f0000006940)={0x3ac, 0x28, 0x200, 0x70bd2d, 0x25dfdbff, "", [@nested={0x14, 0x4b, 0x0, 0x1, [@typed={0x8, 0x1, 0x0, 0x0, @u32=0x1f}, @typed={0x8, 0x2e, 0x0, 0x0, @fd}]}, @nested={0xb3, 0x59, 0x0, 0x1, [@generic="c65ccf56c5232df7749091b37a417616b272219cea476891", @generic="e2d4d221fa557e4e8a2d1dd86f8ac9e6ca9728b978b6a65b1d8fd2fb823608e3cf6edef7228a6759fae7a937b5069d204359af637306cd820966ea86cef0a8dd760e2df7eeea95c30bcde10782bd26163c1d301de80b2e0494cc200668e946e13b136d8b9868ae6f1bd9fa9f92a5e0659468f5bf0c7ec4352d2f02bb76229c531a3ea84d59916a86c482b095c852da9777d03750034427"]}, @generic="db26ef84ced669c4a2be36d93d9fb84beff14bbf913e7a629d1bba1c9fa6da56dcc5b2d9d9a8f46714e2646810e47ec61230546a952f234d9d234d", @generic="cb1451a656790314266595535868cac73d7c080df463669bb7fe78dc36b94f623b5094d64f319560d86dd5d173b94f38b751", @generic="725b1e4f295409271a040c79df5d3ec4f6e265b4154a81c18caf0532cdf5cc86cd4708a1db8a02b5a02e9aab1c6621d0aad20e1ad10d7061453bc9b53c85992b860aaaee974cf65315d3050f9640c4988dc2ea6f3f95a619854e1d5947908a7cf2e37c414d585c5a0bc730b8bfaefe82edc750191de01273c4fe21e7737311719eecf9710f075652ff8db84ba5e5383fb0d533ec6bc4f5c94685af18b2", @generic="fa98dd2dbdcb9d278c3ab8a8a7cd8fd328aa2bade8cdeffa71324f45927413c25d76fdf0f6361196c34d5fc6f0c0b780b31910e29853a1bfdf5949e3cd17e24b8299c05332e7b25adb1a1f7ea9e622dde32b14ebe240c0859f1978179d4dd6925d64c699d4f1ddfb5e8ecc620df3bce0c501025dfaea45077cb1644e3c52d69bf4aeb62dec894e6dcf0b97b3dc6969158062652068375a597bc45c921facf8d44aec4825cd432f0c4b8da45a9c371d7cff592ba543169a808032ac749a5f268e30b67b6325e6f0c3a858499f9050745aebd1db9eccb5", @nested={0xf3, 0x93, 0x0, 0x1, [@generic="9c2bc41feb621bdaaf85f0d81b51887fcbe3e85ba4cb621fe0953a09ccfb745ce0f21cf79ac98995668b1801f88715e9672476956c3bb90186da4a4e8832233b1d69372bad021c2a73eec6672ec82e0005c4578261bcd51973e22818ca572f50ea6a1427bf528fda4dd485bef4066719590385f6f01e8b977bd26a6e9a31e26e22a67688fdfbdc2446f4cff46200b06c06592daeb655460b430d93753e482776f5244ffb1d37c14caf7d799fe3a94f9e08d41cc33fe1b638964814bbe95dcc7c1c196498456e14a8ddffac27f5fb2a6aabc4b6fb9eb6e95c8444f5", @typed={0x8, 0x8c, 0x0, 0x0, @uid}, @typed={0x4, 0x86}, @typed={0x8, 0x1f, 0x0, 0x0, @pid}]}]}, 0x3ac}, {&(0x7f0000006e00)={0x1328, 0x16, 0x200, 0x70bd28, 0x25dfdbff, "", [@nested={0x1018, 0x59, 0x0, 0x1, [@typed={0x14, 0x43, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @generic="91ced37813e19a8a8ba15c9440b2aa7518a3615ca8225251231de6604ad4057527814909fc8016fef7c78ee6bc175056737a5afb76a03c337d8b011f31fee2d3782a3bd39cf90cc9530ac666e9f7a1ce70a2a71effa1a2687fb1adb468246c1b2d8c4d1a31a19a72026921a878f7d1fb3c479421dffd39f3b50b352563ebc179b11f94678c769422c8aa5c10e6aa9bff7cf52cb664ef1b513f97e94884ece452f721013139a3c1848c2cc035639e0790f9a036ee5421f0e9fffaaef35fe85df24ffe1fa65884bb5c903124158fb52a76c07700a069e3637bcc86f813219f448697fcb34c0dd11e1c51decbef73be6bac205d97d1c2168e9675c46f1f232a130b23f7ebf81c7af03fbfce22c664da14c94acf825805bf6d6c63afbecd2aab43581cc020d30a333ae6aefb608854bd8a2f4491d4cfe75d9b63de2541a2d0731422e5bf22b19edb62b1a5c4639449ea791626700b71f88c258697b894fdad3929536c23f27fd1c0744bf4f42ba71b12963b0df4d3cd4b703c93be0c890c34af7fe8395d0eaf6d3a5f736c5571501fdbbf205264dbf8394cfea273d2b26095bd80741c058e4141ca7645ea0a98e93e0aad35e610ccc8815d1ef982fa864dcf322e4b08f10c4562e0a833f02358d65d5639c0b19d17b31261820f89502c659c6772cd129c8e1b36fc2ef3fdfbb2e2727da748fb31ba84a423c319fa181fc37f7bba1006ea6bc5f2b7b38995fc1dfe4f67c3bbe4be0c632103cdd93d5e68b3a1df7d54089f89e942e1a84b15d7c889f4ed035e553137a9de6b9abbe52152058f689878b36c76ebb056dd64a8949da6ffe1f85424815758ac9cdd5b44940b945318e80be4f9e91e529216b127f44dd4af58ae42f6cd7f9aa224119869da55757b2187bdbd56fed04e626e345a4cf345248505f2639358854fa96eddff6e74a34e01af374a8e3877f1451652ad3a399b57368cf017c3248ee2e332f5f798be000dab26dac1332afd691bcf2063a4a3fe45a02d6a939d13eb439bd35e3f2648bbc11fd0eae04605a32aa6834ab9e56013103866eec33f53f20b514e6d8be64336ce57cf9e6afc63f32866a85045ba4d8262860cb4b03cd9c0e6e2a0b28344f07ce7ad5a13b9046464e8dd5f5e0a6274f768cb563dcb093ff3cca55c75d10deae92939739b5a087e457afd87eb99b010c6c3fb15b9d54a3e39013fed522817b3c0d112ec1c4c0f7a74d39ddc9d29665a706e67e132db6751eedec0ff7961e6c17880f3b0ca0217a189cddd0bc093c963aa330550cc4f9125e52deac54d599befc3b938a7ebb28644f761b25b14a26202bd8ec817d5a755ff300416ccae0a4137e6d48189f8140943f64f572f27ea223fda12a3e734ce9401766da6ae8e2decb0d8adc48966c8a14c8026a20f40b3b17667978040234fbc3e3ef02849f71c6c45f5d091ac82f4528094bd8197387723cf82417c8db5af36c4e551465f2b4bcc081db490d214a5bc823ba08f1691d5db1a4ed3206d0bb0d0b876c66aece8ae37c8115eda9868da5a2576f0fb995a7084f05d66d0816fcc148c22693e168203b9738f427e0b1ca3411030f1b4c8824f4515032894ced1da58739b77a1761afc9219fb50ecbbead2645093d0870b14512970b665835105fc39c07ff46898f0e1e6cef213cb7e0339c57cd63c0b4e6de1f742eea4b18ccc6d0adef1943e0ea0a8aef756d676d4fccf907452c31ac7f3a25815e73f83c380c694a4e61a61ef98023f98bafb9a61a48acd644fd8dbda09da2031d45db3b6ecf920279c2a95800eae2854c56946b88ab287343083077af63155089d2b5c82c34618e16378f0778ed03624dd2e68564ee9d9332e012166c3cfeeca4dbee2fb65b2b8a8c5d674ed55b71e97db6ea40b4e52b674e21d4ab4a5cd0f4ad849c5c85ca82e4d30c73e682441b4bbbeb5356feb6c3008b489118f5c3d513cd6164e32bc587d01f71392664cc640c2fdb083a788d63ebd5b78d6ff817c708982c7a62987f311581d392dfcdd223c1299efd91eac0e7a7f3b7c7c5332a0f1ad92ee2984544e77ff7e162a5e768595b8130191ced8dce77eb28e71db3706021e66bdb8a9af63217f5213c29428da63d096daef4ec598671e72c32521836265e9cbc04c67b036b0b292399e2934a5c9e4ea0d049e68723e18894e86a92271b1e6e28e801c5fe0b1b838464fb58537693cdd1eb55596cd8a0e30bba71761b10f103680159c25e3ea50a1d4b0af94af80c678124748c307fe39cf68e6b4a1062e852e5caec75b0a91f4650a6642d11213041b6af548bdae29c20ab25f77e0481036fc3a42eb1f2130155afbe83cda28456ef166e963d879dbb8a2862a233c28e18e961d1e8f58588eb584c564beaeb94482e85c600f04e118884918d2876d61129a796a7049ebc19b9de87a93fe57eb1481ef10f94528955ea8f033dfacadbc9b98e1a7cf63a8314f82f554058bd7c920fe6e5278a27b14b4b44fd91ed6e6524a1936192cf54aff58e713da5b1503693158fc973e4fa076b387ee9d870c0a2be7b8899c99d10b73512facc85c2651d06807bc59627decf055047b530e4357dd4d507b60e1361c2b71702891aa401aa149c90cd1e1ba27f24839297dafb98ab5e155242bc83442e42f9b6465e8f463c95bf3ee75153879e23ec1786c855d73261bb03078ecb98ed58f8c3bfb29ed47166ced64659191d5f9555f177b62ac0cc9f3932cd3614e159122a08f167380da5ac0bdfc3a286ce10ecd71d2ce790a8cbd041dcbad25bcb7322e494f8781f7c8211cd14fafda5cb51cc94f26f909ef3ba827ea983e43b69ea59756bc829a2b73ee7e9849644f5739e7efaafbcb5387074853a2c6147c00968d6cd1ee7dd6fbf92264e4081038d904c57e94638f2d8eb5f516c346251b929e1875329d19fcfe929fe3fab91b6b72adf2f104be1da4942d54efcec5740212e00d70a7173de8371ebaaee42b6bafa7ce8349e4334eb32ea27f8a1489583891f0d8a4da73c7a6e45e549acc6228ca31a681fcb8eaea0e0b6615af3d816f9275192b9b7708c8210a94dd63f8cee6ce838719e4c048e2128b9e5727a36e7a01b674bf49f734c72bf65b8c906ca5741c255614caf20975cb158708e0ef19aa0183777203327b38114a1d9fc11f87c1f5e26be0f539fbaeff613fd958190c929af97de631234b0f36e4188117195081a11b2f795e39dce6a6d753557d14b567f3a8b0c89c736f5f8a01404cca3bff262380e1af15b6eac104435d0cbcdd4f7959249a9f62670ef68e857aca7606d4406b4428fdc166657cc6aaba2d38c4a2897e13a4fc75e658c4a97c5e4e535d213e167d2695c2c0813614ce8968d4e5fd5861faa7276a5dbe8f63b697d3d887abc8a7d907a35f9378fad4b00f460d2368fcfad5a4f8b1a980471060dcce1d6b96e4ec7e656e3017ca160b79e8e22ddf59b01ceaaef9890d52f3232d2ce8203374503529a9bdf97274e380b6ac3ce1b4986ea85f0985af2e57f16a2fdee2fccf642ee37b66b6347b9f00958571384ff298737a84b8fa6d3034249c4678abc7bd7e9d2370f2d345499fadbb42ad0c1444ecb2cfb6ad511aed50506680311312794eded4d5b77e396e42e96917bf446996e924e2dbb210f8653e6bb8cc6579dd0c8c29d50f4064ee886018e6ca2da2b40f4417f609eabf537de800a8399839c68129f2e1b8fa93a770b2ac4cb0c4b2f019729d3ead0b9367b03d58320ef0ed4ddcf5363165bf26bcceedec1d19acae971fadc75b46f17dd5fdac75f96650f341c73ed36fa7c896fd70c725dc3db4cb9de2df99f6cd8cd6164855b24d2a3396c6594a0858eb6ef8ddbd5b0521c5adb7fdaa8cade225014e986c3a1ac8df0a460843dd62a04fe0063e9a1966fdd0458d207e3ff7a3fda6022d3c43c10b2a62d4301ed866f6029d9cbbb51347b03b9da04e35388054982f3cca7910caa316ce3d79bab808d825cb774423631c65ed8911022b2450624c47bab0b5a7533486b68064f157df074ebba749f4143dcdf8a6be93ea9e272353f57288399797fcfe4b45bb0590e633268348f930648ed7fc8e154d7ce91c9a9281970717d03dae8cfd8feef03f961e205c20495171429b8f1aadcb9c564f5acc04218dcbc57b7197e323b56b5f190c8343b2e33b79721fb39488b7e450bde713a43e7c553470a13a8b0828bf20f6171c634e96987e6980d692077bc4b1ab020013d8559c4cbfbcb899853ea8733386e9c960e211670fcbd7261869713fd738454791afbfe129c6d99f62f9b7622b76096cd619f7524f3af30d8fb48acef550a5fb27a90da83674dc23bed4c3866da9fd5528ae3f5d91815053aff211286168e1ab7ba69b15cd4b44d086e1675a08cbc8027b3650b63dd8a5bf0673fc65d264bf4928d77e19b08346a36d7b1187c29715263abb27e752daaa0b6089a7b8609de0789d364981cb0f0910a08f9c5abef15210ba0649003a546dd16725d7152271d030558687bd290e0109f8b958c62c5e9a30f3aaeee3ab459f399832f9835622f6439730cc3c22acb7ec5a09e0d63276e2a74cae2f01802165ed7c219b5c5fa422b0cafed4f0b17871c4e0e471fae310c226cfa742886ad8686731a4ec70ce7a78679f5e8f8660761cca67dfa845ae7e00db440176e4be667ba53d45d95058f902e0831f6eaaa0796e8ad4e9fe9327e1be9ed8e40513c9fc2193206960716893ab4bee95e95a25718b965bf3cf74c9b048e7e915bf01129e91d1f004205ffe0672ca30b87911c1683a7aef244c635cd4025b04deeac5c9ec21e7f2a3b392dc5ac752f1b4cbf28b69a8e7841b42b090856858bcc09966e6b9991b13ccb4edbc0a390cc16fad9d34c10bee36587cb71c702c787a499ac48b21b5bf9ce25880e97f540cb82c4286e0a991e4f49dc2dfb77ca53e3cc7945b131e3bcc3ad6f3fd71c4f77aaf637e6caf0d1ef4db6c60317a7f0143f91c70168c40931f907c3bc154af14e3b49a6cbefa02bc8b1c9c04057c52bd2b4adbd801a5140aa4824b30662dc2233f579a36e785f9f283cdfc66d067755c51761b9dd82b770c7506989aaa9627f497f47431c4cf8296a7d2c9dc94f7525d0c2dfffcf826fd97a300cd32a6ac0ef8da97a8f7e9c8ec3df3caa7664cd6087249e4280ac94bb575ca2e7af341b301cf29051186213aa50fdfbbb629213bd9b0f00130125c73dbbd58d99543a3187131e3ff58d567b22a891ffc7b27bdb8850db5421125eb75da80116133bd4f1bdbb9554ff8624b48d2c5223bae6a1a17ffa68ec7e01494608ab5f16e9c55227c97f4437486485f6b1c2edc5cd731b1efc3d5b280f863b9c01ddf861ab28283a24baf56c981da99258d498bd8e843671fefdf088ea27e1704993c54be16205a287395555b1717faae5c0165ae632262dd0f696fed869cb708ebe66fa46959c5748a25264f4b0b4e509c3cec5a77937ebb584dc33e37fd9c9d38eac74bbe3aab0e70b9fd6abc855d6f42c8ff83a812e125ade93cdc0e8cb55043917b38a4f8bf45d8e8f66852d2ab42b93f49b32d0d1a2272a0a80e0a24501d5c3830491c2791b4e6259e85ea8b37cdff71194ca9090c5461591af8bf59e80543fc79241cda26c32b503d6dbc22e753b0547036ad9619231d37be343abe2b376abab8c6ee404675df51974393d39ffe0972390cb04de5a8e5f0b1030eec2f18043742a910c4eebb28d096212e96987acb0b15de96699ef3cfc32aa0644666bbda4de66e31682ce673fb9834d0285ec1957e31f180f5d7d6cdb1d2"]}, @typed={0x8, 0x28, 0x0, 0x0, @pid}, @nested={0x199, 0x9, 0x0, 0x1, [@typed={0x8, 0x8a, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="06634fc4b6fdcc9c04d842be2a7279e64a4ab30f3fa348ec41d713f512ae42c65f779e745f34a2295f11062afd224f2f45e24ed7a341160a941c40cff4d3b3030bfa25b01fe312f3539d82e3b13565a371e67e4fb61b4c3cf0c3f0a822d44336c7218b69b02e3674346578856e9cc97a83ea29ef4a1bf3473dcfbb5bf9d14749756ef0107c2025cf52c855f0477abb624cce50536557d9c8f009d9759f5aa22434bdd1cd7d73c8dd12a747190b72fadd6c489ce5857aad25132302b08e3881fd8894d84b", @generic="02c379496589e87687eccd47a2726ecb1126596450dd4748c785126d524f56fc8609123625b369a4adf9745e883d1ff4cb98a01d598625d96f94b5acfc58d70cd8caa5dbc3f991dbae821c83aaec2a9321f81bf03d6d8673df94ae6c15ec4f0db7dac873cbfefd94b16bc8d063e8ea59c979aa1d547b9a5f3c89bc75cc92fb8fda49cb19dd6c2cbd7a4fc934", @typed={0x8, 0x32, 0x0, 0x0, @ipv4=@rand_addr=0x64010102}, @generic="fe4fa5f86566be6f6b194aae89172cdc863823c728db132eb0", @typed={0x8, 0x6b, 0x0, 0x0, @ipv4=@local}, @typed={0x14, 0x3b, 0x0, 0x0, @ipv6=@local}]}, @nested={0x159, 0x82, 0x0, 0x1, [@typed={0x14, 0x31, 0x0, 0x0, @ipv6=@loopback}, @generic="cec92f6dbcc76a131adfb609a2b16b5a4de22ee8f8f239c477d41ec15f7d2445564ce863925aaf949c1a2c4a575f7d1435469469e27f8a7095d65b0e782692a838a8ce9f7e74ba8c90defc", @generic="1e6cfce683156172bfddc61ed9e3ccd3a50d9ace3a858f0f0ca002125a80badb653de88e1b5658b0ae1b350f003dc1d9268a46bbbf9025dd568e7163a4a85db8790c390bb4e45e562ba51ff55dfa62389238f4c0117cc6f1c3de9f8eebce8b2ba1e89fcf4d52ccd947afda293903bc5045602cf362543b2cc5360ddf797e51b3763ee3b13646175721f57d879b8629c74fb79617e8de2c581572b942b465d7569962d62004c223ea5dbb2d448e78f404a0b6b1588597be191d3dd3ba4826c71df86bc35438cb37374a543d0a29d1fceaee3b15a9db00304268a8b487503fe72ecfec", @typed={0x14, 0x5c, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}]}]}, 0x1328}, {&(0x7f0000008140)={0x224, 0x3c, 0x4, 0x70bd2c, 0x25dfdbff, "", [@typed={0x8, 0x4d, 0x0, 0x0, @u32=0xc6fd}, @nested={0xf2, 0x8b, 0x0, 0x1, [@generic="5f573947e338c06c6e2835d3d7caecfaa0c49c295019299392dabdcdebe1521b4e34063a023714b7baa2577574e062497b1562ac23bdd8dc3dd4c5ab6ef61cef168811742a0dd3f7f15fe9ed988e0671c863d81a2d215b372cd0a553e1de6a4a1a971603101bd17484159ba7a7dfa78a014402e6b3a985b773f7bf881177b48db8f27d7d1d9f0657", @typed={0x8, 0x7e, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @generic="e68d9740362f2123300aa8d6fa3d354cb484ab830d402805da4ef4a2", @generic="98483417e100eab125c744274f04df39f4fc93dda108031fbf7008046ffbe2de7f0628958d44239d956eaed0227229d4d2fe829415ed6a3e63e97dabab99f514f0dd"]}, @nested={0xc0, 0x10, 0x0, 0x1, [@typed={0x14, 0x1c, 0x0, 0x0, @ipv6=@private2={0xfc, 0x2, '\x00', 0x1}}, @generic="f34c7dabb1ff2cfe1b07ac479d054e3c49b2631676f3bdc935f1c7ea0c4bf433958473c7a4051c2cd76238fe71c89388173c3f7b09f1ab1a261c5127662d0f1c8b27d1f800d3c8447dcfa83b05dce2f04a075f85466d93598c70a3ce5379d2093fd10737eba1ed917542c2dd4a9368ab8c18c3b39668cf9cba85b432dd30da2d33b7c840e382e70845addc4fd74e18ff4f881f1b8f3cf29b230a1e0d5a2d45eb28c5abafcfe0e5bb"]}, @generic="7048e4e0626423be285fbc1a8c48655c3bebf6a75259ad050bb07cf017d0a2edfe9ec5b11779d6fa7913ba2d5281b034fea083de242a9089759814fd7950cfe2ea25ad559770d22eebb56d2db705e16c94d0a7497df287de"]}, 0x224}, {&(0x7f0000008380)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="3103148008004d00", @ANYRES32, @ANYBLOB="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"], 0x135c}, {&(0x7f0000009740)=ANY=[@ANYBLOB="440300002b0000042bbd7000ffdbdf25d700008008007c00", @ANYRES32, @ANYBLOB="2bebe8ee434fd636c61896d7486cc8a678ef694602a2980d3836c62bb6ea8c67c39ea57076d7d715cb07256995f4144e43a5926ca296a2b4635d2f62ca99863223f8c31d4c6eb88897da56e69cc0b1bb1a5c0549a609d811b817c870564bfe91a7f9330ce5a09aa7915e59fc6494efa44fb3437d000b767918ba1e3f8c144091ac08483582cb0ac3bb9e48aee3b4fcb26436798d36fd1bb8484ec352f4639c83119223e6c45057e6f08a65786f3b9a2646b326d722bdfb97aad65c08004500", @ANYRES32=0x0, @ANYBLOB='\b@', @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="08009500ffffff7f08008600", @ANYRES32=r2, @ANYBLOB], 0x344}, {&(0x7f0000009ac0)={0x1ec, 0x12, 0x400, 0x70bd25, 0x25dfdbff, "", [@typed={0x8, 0x3, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x32, 0x0, 0x0, @fd=r0}, @generic, @generic="fce8b4ff2532eaed005a40fcc0f2c7c6d2f77d8ad36b74a3f32fc878e708539d019b14", @generic="df9390f23a4a03e41e91b04b9ce96cc3e3b207a611798ff53db10f8599cae84992ff332ee0280865ac7db7fe61f84e017bbf7a8f1111ddc0985721296d18e9184f4398df9b1a686beaa72df1990bab7b0a7b7ac0a79cecb0d18a3028e0c05447bc2b337380304cd20032a56152eadf222168fa0ab7c0a9718759a24770837611a84f8bc8ff0b231f8f130550aae1b004dca84db884d828c5e6b99dd5fdf179c53a88ee860184c7bb59651bf11241305aa062615ce8876289c334129d2653db5567c7ed7a722f06de47a738778642a6b8449fc06acd77655331996d3c792d43", @generic="5793bfceaf3d8d05b55e5a844cb4846d54352b90689f933e562261cef9378546cfa42641fbf47ddc46dc7f732637180b56347e845759e4706f1e90d2a20e40a5ac5bdbd664fd3ca78836d99cc99a894b44b2ce311c3f3f3a5d5832c06a4a07104816bd5b6c243c96ca17fe58e63a8bf7c38932c8376fcc4b76f849b0f6bafdfd20a5ffff054dc99dba18004abefd3e9e499efc29428f7b9077dc6992f874ddc27b26", @typed={0x14, 0x68, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00'}, @typed={0xc, 0xb, 0x0, 0x0, @u64=0x3f}, @typed={0x8, 0x63, 0x0, 0x0, @fd=r0}]}, 0x1ec}, {&(0x7f0000009cc0)={0x20, 0x30, 0x8, 0x70bd2a, 0x25dfdbff, "", [@generic="545637c964", @typed={0x8, 0xb, 0x0, 0x0, @u32=0x6}]}, 0x20}, {&(0x7f0000009d00)=ANY=[@ANYBLOB="e42400001e00080029bd7000fddbdf2524106280150087006e65742f6e665f636f6e6e747261636b0000000005000900000000004c6b28858ba721398f3d35feceb48889a684ae8f24e4051231dae3062bdeedfb40108fa463bfc23e32dfb87f38c6cd1beafed335ac55007c9612e2b574d96d05a4321e8ef443ffd82253e3e89451fd71cc29c6058fee0c338fd8d4b894743457528d38bc725fd0d214f131957207d98495a3a289a36f4cc3ec012d0e2844358e61bcb132a4cfdfbbce55eef61294a784f3231edf5338ba44e58e1a4576e10e39a792b16472f69d6a84d0efb528476f46ce54615ae8f3e609de579e4ac3994d53fcc8367a83a55eb2a8b20e9cc9b2b339bb916e51aee61bd2be97b40281655eaa920916de11eb117b90a66963668caa7d7b7ec506e5a6e1c9c253f7b269895944e5dcc8844c1141f1ac12920880b2757b470b39d7c219add797e9c181b35321dcbed115172eb7225c3592a9dc3db125bd9f67528b98e09b081bb152deb751d1245068822b8f90c66f9b27e585c4b57e19608008838b31ea880ffcf0ad831d9c41239a5be344cf286a8cc2993e029c847c6d0fe8a4e1aff59bea134a18d0fefe9d0dc76bd9f870bac3bc35b223c92642563361bbb7806e6c9ad4cea0adf45033f022f04d616ecec832204e2013b953a38960864478dd23e122823029a64b14fd77ceee8ce6ff7eee4e2b4104d805d73a616842bb34cf0e4ad3e04a7de6181a3256284e11a6d94d6a570323ea73a8c002399c4c0b8523d92771e7cfbd07832091ffd3b34729d8e9348f865d12b4566ecc9da3369a872861e4f60ed0160933cce70566d0ffc78e79e631496910867cfd88436b3b593df498aaa271bda3cdbfcdb230539e6eb0c5292c68bd276196993bcce0756f6161d213005fd46097c757e868ca858905942bad6b7ac545fabf610ba742c6d22a80c74ae15a446fc8c51df097c58dfdb34b63a4ed277aa29383de9e1ae99be1fd172ff8ed51d69eea26fc372be68952efb0fa7f478eeeb7b635fef1c1001ae9f5dc4f7b02580af507b587edabf5169843b7d8aef6f614b3c59cae2498921a707830554c42db5058502c1d3b659c1d1a746004afc91929cf408f7bc09f2679472d65de93914fe51d686154b6f9aacb4eb17e7bc143ac42d684e54ff2675f53340e301dbff213e625a8d64da4c2c865dab11d2c87148ca81c6cdfbce606a296d422adadaa4ca5c8fe6b91ebdba81a4d821a6a2805143a48da200959694b2eaf19a45357a7f3efbcb5d9ca20f280b1bd3ef3ae721304ad7166681879cc64afd6bf61c7add884026386c6ae1283e76514dbe95837eaa616eced4b057643ae372ce0884c2cfeac08d8cc814ad4afc36a521d0c8da8f5688879bb23afdc7b518b6691d57be2e507568bde653a529a33e59a76cc3aab78e58e1aa33409510c6a1905fe3c2566cd49e0095fcb969aadc1a659854a70a10f10fe10027b1a525f9298fdd9d1f5ce70499ee8ca7c34dfaeb1c117c6a89c34a7c5b19e063122b4f83f593110c78fa25de4c6dc6c7dcff94c69354de01b0eaf0b0d1d55eafdadae88052a0b210f802b775af4d6250285faef3c2ef0a87bfbfb18014fc8b3721352ee14446758073d445077fb0905e2a32aea681ee2f6437d3c8b367a4cce693039ec9023e858c61c0f570a137d88709be460d2ca80d586ef41940ace6b740d43ab9bc653a06d19ddf1e18c18d490bb0bd3297301d69a914e7558676a2f3a631a85a09039d9b37fdfa0a9543de810827b984446d6146c2601294d5fcd9b869dc645f9dcf9b8c4f694858dd32afde36951fae9d1f816b84aa0c954f5c3839ce2aa34b4965c88579d79698e60e69cfb2978517d461bebed89cc7415ff37569fff7a26a1aecbaa0da3f8173600d0a7a5bbb9105fee55f275c89f3d9853f879a2082bf492de84a6c611705bf1e65d75a6171ae9132523447f82132ff59084c317b57d469915b5751d0d598f8c68e76d3114c7ca4b99e09219d683ff87fcb9d28eea32969149bc53f127613d2f9f1d9ff4a5b7d4fbb5f6fe9975f2a324e3b22fea682c81ea03689fa283349a8d39d3cdd706f91e54b613d5bad841e3051bd4f3f49914741e57221b7beee8f56948231f0905830d06524e77cd61f2f3a556c6a35129fc48fcf41c957534d4d9ad4fc2546234b0492c5ff1d5a11d2d7f2ba4bf1849e8df94a820fed89e04769f765cce9005e7b759f71fe87a94e4456fd117d9a1c0aa05f3a309adadc1696bb17c6c8a15bbd952155987494277474f71fdc41a74dbaf0cc67a78f3542e9a2f6c87795d584538a3d8b538380af136b27f6bf0f760f1c0697a7bac23fc167450847893784e404c952cf75b2d7c1eb94101553e07ed9f53c9bf09a5caf059a878e1e34dd826505ee37e00c7979d6effd66c4a4cf4079ca2533fda26c0180d19a16afe18bad83170621cbe19f4101a9e7e4d9bdc02863feb58e833981d6cddf81c925b0125d9d698c3ffdd3c39195ff92a742ce395f289393f709d2a3aa63ee97149fdb8d44e14ed0d5d1ac774f11b657568e47cbb3762a6e04b1080005eee7f0e0f0c447850d354bc0808aaf69869ec7acf06e08c08f31f6d58ea30f89cfa7485eec40e00ea233b424a39791d19d3c292b8104a0710b3821e4bf1533f0e380cccdd4428c2fedd2ca9f597738fab9fcf6483614bfdfa3bef6c576f12c090a76b9f41e0518df38a6912e7c097971086e2e96683b0ea174dba7236dac2063a1f16d1780125e5ada9586429ae5f9740b8f8e61134dcc77a2e7c52765d846d5daedf5bc853a8c29a1fb78b6765fe6a409a214897fa82dcd18dafb6fc32738e121e742d0ab5834a339b06b5a481132b374261f7a48f15d4b4c4082f55499990b20c9001d7dfeb2a41c0365a134a828a98400e3b259428d41c318d952cb0e8bfb6416ff8618266177550ff03a2b749933d5bc534012355bb373062142be0376de9e8c8da602bc6728651e2e3172a00960e762c73aa38a8c6feec682b458ab2511420843f3e560f934ea79c3f08d39e6a4563cb4babe228e12c668bf88104400be6bdc15216964b2db0156edbe02fdb02e1f2496376578d5574edda7159baf34d9e905db5f06e445979f19366d20ec6a5f09fcfcbbe24047e816f87cf3c1b9ac05cb61edea2a1b4c6dbe7656e8b92340db3d15408ae968f5f94615fc7b84b09b45b8832071388fa80b5eaa5c12b73d01d1d22dbad585ff0adcc60758248bc71e98764c6bf494c0385e0bb42daf1683b2412a8862f1ce037ff2a172d81a607521f2cec80e861e6ac36eebe9b8caee7881a2f195d2d11559381b5f39d9bdfa43d897f9643f8cd1f9033b354c2be1550ba0d06ade7a6179a45256bb1c50fc6ac1d89d04de7ca9de5dfe6b06f3665e31ad9c63f217d9e07b3482bf8c31080bcc40a011025afdccbab4117603a76983cfa54135fa2c6c9fc0c2eb51a2be575bb6d38ce224e4a33946ff487cafadb9e8059a51689e1db972f0e87171b0caaa4b0da1e79270febc11ffe323d8a4e4cccf7ff1977ed06abb652314d53953f6bc7b9888c6ffd1f29c41b6f2636ca34a33f18463f941d6e70f29eab9881639e512971158b1ed78f59b6705e9910c49dd876a82e6a1a41eb8e741ee18cbc7ec6cd77b7b8e36aa0651ee4b48a3ee5de86e0812969a271d7b853e6e7cc2746573755950e8bb816c9e5168fa1a067b2f5e3fe521e2ad8d98f343ac50bf956d394abf852d3e9047f153503303fa7c586e6a10bd9594936b5cade880d5ec5b9fb173d056316ccd98f07ae1adf216dcbbd7bf8c6b2370558485cd55ab10021667947c34fa17873673dfc287d26f5c27fb507fc0efc9fbc0346454fc2f56c3c36f2743225212933abb9370d211aed3ea2d5bfb84cb3774f4564ddf35a96a447df5ea41646cdd0370a0035ae59c14c9d5efe68031a4bf7948b6e614683a01ba8c59b24a5a5fcfa0c93dd247b246160e2041273f605243737ba7cbda75b18db75dc1b7f4c6d159242eec7d060ca3016d3a867a4e3355809ebc6963bf56dcd7a44ead2473d4d99cd331dfefa09c0666ee14ddc31fdf88009dfa8d539a5936eef914d33136a65460f8f135f3e56f484110f7e378ed786eaba0e0e17279c65201176a6f09d1422b2e1ab6863a14bc7e9f30bfca7b9b2c9b34a9ee608a965db2c34b5ef81b01893a657758fd7dea0cd28d190541ace0a8164f133806eebe3ce94c03ae8ea67cd0bd5a9bd46d3932c1a5fda4b22e662ab98093b02faeadbb5ac28ce35699b99d0380877825055898dcf2642e65f3f991aae83c8244b6aa3fb7855ce7b5378294e78d6b82f63adbdac7a171010309095ff4326559f221dbfff12536fe8fa1f1f1d9bb5fe56b1e28ba8687a160db26769cb186414acbadbce7c171c6163263da710aaeee0955ac3b565b9893da07bb406ea7c66df0cc73a6c6afc5e110763b07b82266a9594fd8065925c03cd88a112d1ebe10e757aaa554bcccb12669dccfcfd5b4e3da39d78af7c45801aaa4f5c84767e964c1b831d3f1cf531aeb61a5153df0f48d83f02b5b0eebff57dcc9c68e464ae6bb2d02f4e1e0c1865d9212763e9c5c75d544ef6b296a3ee140e3b85c0ce8c73a6651ee07210b11c39792594473a23670eaed514920299f594cd9699f2e4936082700ed0caad2be43ecf47a860a702e8bc27f63062479220216d184e315a75384b1892bc76a8fd7fa1e7534602a5c2ba206d5a0159592ae01aff9111bebad86bd0130444ba8ed5e63f0dc2f56c577eb099e89c1fadef8a273e63bac0618f41c25ba1826c04bc093906d532023b9f59ace7777272eaebb690cc5c41151ad6a780a75da15010bb27c1ab3778a9a4205e3e01735063417ab516fce1e60e0570df33b457286934b4a4ea12fa5e9522a4c1c317637f38811748dc5ba09003f78250d78f52b8e7d8ee56812de40e1ad07b4fcaf57b42e48f8d75009d77e8a05ef2c04bb117635c0dda32090e2685e2755ee3af2587118744145c79062d84213c01eded1b594dbb1d3b677522c883851ba3fd2707d9e69da7a94df80c0f5f9bc22eb2834dad5b779e4d2b61b5e2a700389827810df5d5d88f0ad517df7b33762c64505bc35c7054ec340ed708e835fbad588a107348955599441ba40c81f4223506722c33610ce78950ea037d0ddf0d398addba9814d1e619c168845016e56393d19e9dd33d179590aaebc8e33c453b3539f34236a6b353329c64903cc1452b110eec76a3161f0a3f0ff6cc325e450c4bac818a2194ed832cea1a5e73509bd949288f3e29f6704673ee82443a6da7f3b37205764124e7b5673e81b285fa6db02ca26730d86af5ec39da5940130314b49c5c4d0e8855b5db0b891fb223b976e266ecdc79fb410b2ec760098e28bc48d5751b1035c65a5c026c0bfb5cf2ee65eb697f5269dad70935bcb4c1b3d22e37c28488f50fd89ca40d0e413c406ff06768cfc40ccde62cd548e941260f9005107ab14fcb5f0998700256852aa3a49f8128e040b80c8182186002c4285a74532a54c937ef2e542a916f2f1c710b70955b1067aec228d32bd0478e1640096ba45ce708558bbf0a2d3e70efbb8a05c8754e04f50da4c4553bea6ee10782a39efeb7b2828fbe855e3f35ccfaca363530ed1fa69b8d6edd2ca400f13f36232033a653d778a3d576b69c695b32297e4ea17c82c1c95af3acd4e374f7718f002ceafda411d18ae168a329ce3667eef15622f9111a257c900166b0bee990b07432ad814e988628aff3dc7b798c450f3d652eb8bf3f58c6f2a0887e4235f0c28d284001093567b94a47e41cbc98c232b45f2bbace96b545d3a6263bf9b1e7404a4b66f5d3ddc61a5d46ba2c3d14264c7c9e3de7b856548d3ebdfa4c6b28249dcbdd68bfe6671fc00950bd356ad3eeed827bbb3ddcafa22fbc5b7d27ed189693a98f30d01da8046051642d20859e1a884c59b04f1b7a812aa5fe9293eefd71fb5c7f1e180deb9083b2fdac8f259221ecb9f5bcf1e66b27bf1de4cdb3420ffb5831794707f1fd8a1ab3a8bb73361909e6a81740a8b3cd31f9051ef2628ae7b7b8fabd9c29528836a694d51f3cee3028b61fbd01847fc3330e455ebb2c82495b98c11566d9ea4dc2ed7bc75478d2d5ac73b25d3d34c46f34aa7371751223aeb136d7cee923b2d909f5731c73c862406f6bf302535bfcdc17053b07f36e05dcd739c9a32c6f7360257b7b67d4e2e985e99c678dd403411559c199391aec3bd0148e1d1d464297ef9ddc74cb048f64a1967375778a93d981bdb071f99bed1855806658b55c16fdf3f1eea17874be259519cbd818b9bae88c7dd7b0cfa137327026513b158ca09b264c9348db5820e24fe6ea23a824101c77da56db8ff03e499d206207f4a21a32c2451931f3b226179301123b34d74bd6f23e20b49024bad8d8ebadc69f82f618ae1778bd3ba5e3ab45de425fc3b5902dd97c93ec11d40ea1ea3583335697457322f6cb428ed520d33b968b1d7553a8f417f915f6f4559776cda50a14004d00fc01000000000000000000000000000195e78304ba0cbac6a7b5af3aa1f053755d61799609ebedec6a8bb8cc039ba9c541625a2d5c81844a498326625aee44067b4767652b5e54885f0e292b2f4a32384bb8481eb1ced332a5f0bc4402e2eb334719cce8b10eb10e4f34d24ce2956a16ff72113c1abb95aa1b0c5f570df12fa3d57308bbe656e30611c2f4d13c6865dfe601bfbea697b159b6de56df31caf137c4c0c33722967d5f1438c5321c4d6bec83f3c5571de31e462312b849d3482ce4b88fdef4c0a9165aa69d4f5c919ca101d028cbeb74ae12a630d5fb0c2d3f1b323c7531e0b1f91bdd6a015c97bcc9eb7b3f3feaa74cad13095ca0ddab0d92346acf5d9a4ee0fb7a59b08c90387ee040c23db6517f9056cea08828fd3cef359b0e40a69952c497bdea4bec3672c8538156addb6832df309ed8481c77f2cbb62ebebbf93986099f7bde49318a18056749fb7b81f18d6fba9d2c4e0ca31a8de5d86eace42a49deb924fdea453c5c11332c89b6093e8e36bbe849223e1941876afdb3f5af9757dd73e52a0f76e66d62a5975b22e79675648b45b1e0f072c0827c6e18904c46ce34d74589804e4ec2b3b525c30ff21d39cddefef46524a76b7f432fcdb2bf7d5682de9b0f5eb9fd107980b545c512eca0a541503d02e479731c6f3534bd4d6f3876fae3edce0482945da9f7fdc2c6153228c7013d37c43478c959d331b65d339a90678f12f317eb3174e4c4be8222016be1ad69d3618c9afc0b69bc55c0228b3254b3c9901d0725930b1f27ccfee6c9d4fea1f26148d524f470beea1daab1a72c325b67325a59494ec9223c9780bfd69915d82e60ee17b301c94f85af53c6afd5538d8e1ee7861a9d53168677814f2749fe9eb741820cda37fbfd4ba4509b9bc5d2b481d9580a859be4ee2d9174a144c1eb04a5844d17e0a89dd7fef9fea14193b5225fd4d44f29b9671f5f5668005c73c1045a1fb4a3ef85b073680b6596b8a899ffc478ceccddad8fd0cab3332c8d0e9d816b0f96316f5a299eac942bc7d1aa473cf2a9f4e13b58a4e6616df97d11a75a0d78420106c9b5b1ab15e480b58c6d4f0be647614a7d7e4c1285b8ea463b285b3a7de9b9906748c31086c68eabedece090c00f033788a72a4b84ee9236546be44dcfa6fb1f64bd4fd40aa30c3dd07021acb5fcbee8b3d00102f254ec084bf60c2ed6c1e3e6ea82cda962fed4371056296ca6cee916147ad2ea8c74e4efd5f07ceddf53b5a47065898a894fca02a5d42566d1977221e52254739deb33426651f490707a13de132517c2385e1c8ca7ac0ae7802775db869b45c9250a9d192f266b23cf43fe1e2ee2de6509a593c412909f4aba635d43d9ab6efa96a724a61e22a64df4741025a95093badf4199a08f32a5f8a353a50c96fa9fda7e9c07ec494e195fcd3ff0c315139e2e66b0bbbb31c6cc1e1c6a5f3ad4a7b3a5113a8bec35cf9c1dbea6c5b8cc5b195b703f3d3dfc66b065bfec64427d9d8e78564bd87b4b922d30cdc2f47caaa4165f7f423b016eca65c83a9dab7eb4c26747d1cd6a2170f93822e9ecc0f2607d29d534a9b220a2dc5d9b41c9d8ce185e669167e421d6a3f204923f085a83131fe48e3f4c97702129a3457efc5adb377b85b156873593d7a47617c8196d971655e03e90489ddb6e99ad5bc3cad45c2ddd475359b91df326bc8439476f3e29dc4feacb7979d14dee82b3f941b6c919bb82f965dc8bf4ba0e102e578c3d70387ad5a9b99ee642c06cf0d728274c7e96c18e3fc04c54e2de617a374b7cf16a86b433d19dd47d3e487ffe707833a18f197d7d32fd84cfb0182ef2ca273dd10d4ebf841b1cb176d04395cfce61968c72a2665c2ce30ea46bca4c99e81c74561ed39ca73b3b0d8213aa2592cf20d9c2a42fd54f8b78cc78bf4ca8c9d8dd0a3ba47433656d7c2b5283f78ebf051e6a4b363d70ac90af8d1ef0ee48fe17db85fa5a3f17dc6fec57f68f0ec28382c4a24240e22a3e6b687dd282ebdb067673eb791cbf9987508f5563c50604f8502b13860120671757d3937c50e9d17bc8831ca6b0bedefa87aa522ef02e4a4f292b07318552a3af39763f5e68a63d6a70934cf75a3a7f450c82b4a78e9a8f3377ffeeff5f555acf4847a5d229a912608047a23a2b92bbd850771e69e1898a6c61b873f2ccf021f9fdf7a871976d6eea223fbc32c0bdfb5be23ca21893c2a8ce3d858b9b14e7fa2d7eb2c3d51dee663b1cc3d5a6b21cf3f9170c24a845fafcf2928c6f1a62b4ce3b81bad8146e5cf93ff19c60c985b942737df1288834f11375e7f5476975781ce70b7eb6b73eb8c62bddc3c42f030399890801eeca5ced54f963d6c8ea3cd8dca655c5383071daa1f0b3508796beeb87419deaabb9d4f0b641cfb01197f8d08100ce215dbf8435ff3c1b3a18d479629e91ec8c7d459cf3c62e17094df575c91d458bef8e730493214ee2683462b49972873e79c3d7ce8ad0e1afee90a7d292b604f6620aea3a663f064b40195b9675ab3b0ed88f42ad9742bfbc44117796586f032baa313c5c07460fa6a927b11ba9400cc576717abe85f022e463f6864b7b3ff5c0bfc897d2a1d3d725cac3fbd38fbca3e71d99069689df3e634310543d73aa33b963600786a775343e0f7dd9a116e89fd95538165ced5b69b7253eefe20236757102c0d9a062e4de9d25c655b835fd3703bcf587fbd388958c735037d26960c56d17a55a94a8863d15d82ce6bed97f18e162474bda976d71118c132bc6943a12b96a636b067cb98e1fd9ebb50b2b35ee7cfa74e0b613f5045b86864f11ea0f2e407aaa6d34e5f1dd0a9d04a7348ca58c32e3e51e81c716a41384ab7544dfd7ddf0bb4c45c2aa9146549b68ac666c1a06944bc5d0f03f5e8f325ec71a7cfd8d030ea155e02c7e130a42d9eac2367552f7ad7ed8216ba657703baddaad04bf587a8305d4d921fbf061b5305a51c1cac14b787566563162d54bd713c922512e5e05ea8cf0c2afa8ea5f85067e3ce6f84bfbabd8cc42911014d7ecb1024acac310e69781c6cf84cbd87da97457feacde5e19b1141a549b4831216328c1da3cb2637ceac7921376610fa559621a0253c66277d292bfeb55919a18c985f38e9b8c1501d3b977b6a8d3d65e0d725699e50907b703e1f2975c19f2a1846743612e2712406d33b1b3997d3ed3c820b58953ab74172f2f44065a88df55b3d287417f1032fa526a1357f923b7c9f59a1a6a60cb2075c89c75203679eb60f76532607ce86ce828f10b4a06f07b7aca4b33407c1a8e798f8ce7f2d3f2ad2a1490ce608c53bbdee63cf1dcb48df539d86f0f8f47774797f446dca364f1dca05046d82de377cfb8ae8360a1bc7069208bf06e5f98fd696cde7acf9d5af267a6a4977d149456fc77a5dc152949d820ba8014631df30bd0d55c08fb855574eebce09ffaa37aecd41fd979abedf66f2056ec2624956af9564a9983cd289c559f73e86ab65775fef91cdb329a4592cac6d828465f95a4842cee560bd0d3a3033d8e834c61399c1c7e78bac4ba92fa40f78fc64abdfb962b5f15fd63baac872113ca46185788f3b371e12ed58ad9afe1c6f52ee0b9451aff28145d9ab6edee6694c95608c6e0fe9adddadf2b077b9def070b3ae21b3e8cb2d6e9e29dd1c15dfcf5d700509a452a8b49cff43afa1bd7c5cfb7c7183702ed31e0edc1cb5b73a4cb3108bd83e5546e1e543852408c9f4df537313cb8f23f99fe7e6304745351e11b009b7f520bea5d2500780e345afc1c6efcaa7f8f59b38ae74daaf57dfd80cfa0485b685bc167dd4b8653da31e21c8146d6a4ed3bf0bb6d3c374c9540d0dd50cbbaf76ab54975c3c8ff40d789467cd087b5257967a69d50c1f9a4f5a7742c56a6a1b28a2a902a58b56ac3701ddb549f7b80e602db4b0e18fa35308cd41856db2b625bb88725f9aef9a74add8f76310e96c66d2d611bab4e562b4374eec0df6a4afa8f7a216f55d12f00fbced4505fc1c5c5a23bada2abea0552e1bbd1c363958f918c737d4349669ef2441c94506b3f9bcfbef8b6daedf09ea379ff384154a4b71b838a4f59b7121f2c3258d52254965b9527a3d8ee45208f941dd4c860c21839562e976f196f2706e6a7540fbe5a415c96cbe6b2938705ec9f9004f6262deeca98113a4eefe50745c634e6e75ab20ec5d921cb77ea08de25e27a9ab6d5460d5ee726eac569d4333df4e5cff5e28c4eb9eb46e8d815e2722c35ddbaa727a16e382d59bcf77c3bf44c399e810ad0be04766022c6ed488435288ac7cc6ba330c98d376186fc7ec6fbec190faa38c20ec6fb814e82dc1c8ff3044441cdaab71386ae0aafd7e3b891a9487206760f3352aa312222d6dab714d9fe1d57079ea7f462fe5349ee9de73ec7687e0ca67664bda48c1f57d63079da75c5b4efa8d741d78c526616d6503fcda16280d24e8911f0366aac4963439473b63b3389cc0fc311bb2b24ec3069b8ecdffe697349dc43feb21f459011b3aea521feefc94426d11c563734961c81f7be134ebc93cafe11fef3be8260297250dc17e73288ff425bfe7e3fce97a5b0cc5927335d35bb2655223c459024dfdc0503d2b1a0f8592346c3a84f546b99f3c3720873a4441115a3440f6be3ade816ab062342f72f1b7e8ba05f4dd2c87e885425cfbb7c64f9ae882477a031259d77b8ec023238af4f7a1512da81f2eb04cc52df58f2451bcb1427889a3bd384167e810952a2ed67aeeb3b89f94ce3ac4c67040fc944c28d74e2f3466fe3e555243aacff38fd980be1bfcd3fe906e8d7dffc2927d41d0f917f1e094f6e53c09377f1fb8e23cda5f5c00f687c3a31fa276bd29966a3b737015d1d6e84d680cd5f99d215a2f232e025450c3fd88e43acb80d55fc144414430c5e949111b825f52c4df66fe85cb7c8bbcc0c53b6b50e410caf822a63fc431a8b5d2296f15a1367716f93f6ede9bb5032fe1ce86e5c92742793f84b2d09b958f508187d88203e1a3b1d2c7ac95fa703a83a3842920ea87c1efbd8fcb34ce976de1676319966396e9e406991334ab236171bcff596835ec61beb064ceb29f61808a4320764cbc5c7dac419aec40c8dd000c3f3b596c0c895907b93b975568c416e727fa940005a6eaa9a94eb3938530c8ef91713bdd4a7446c51a200a7eb520c4243a3cd933a6a546ab4fc8c1d2c185edd3c36328ffe780397773082a5d696d41c04f36212ad5d53d00122e67364c10e3ea00511d08329cabcfd8110dc0b703e869ca9cae365ad9a82e8872f72daf803ebe49f6c1e631f3ccc7c8cc4104add891644ddfc8a216157a55044f6e19e30cde69a2034521d7e0097db287fd5eb532f990e411a9a8da12385da419e6c2cf9839c1bd935d3bf54d536bd15eb8e171b3bcea74c3636509109a6904bb4139a7f7276207175b0d934d0144f0dc3b866a8e8f13d71f131dc1383a5f7f0091f9cc9ee722beaf5afb3203061cd888cb638b0d1e1156637c502a4757ea62799dcb84dbb5cedfd20088dd323ed33efbabbf5b5b8063d823c8b5d05cce1e30a8e02d924015cbd59b6a8152d56583606dce40f71342af263becccbd2fc1a15f939d548c3fd82073f7d5b5e910aa0370531b0b7264e8320944c81b4687feef6a98049daa47c20456ae9b3ea4d857a7f12ae048fea8a830aedefdb7124b3b3bd781ae7def0d24926ad5a37bb1b88c278eaaa9a98d5322a0408a50bd3ebde9a69f0cb7108cc7974a64e1aa8dd395930dbd756e3806f05e131adeaedf9b481222d2cfd4845dfd607dafb02eb44929eb929baafb057b40acf98b763cfc340a53fa745faac74b7dae60d26df4dc3503a169e431e13d8f5bff68aa97216eecd5c4e8e4851eb5e3b590c1a58f9466e7fc27156a2dae5c62e2bd1d31e968641fc716456c422056d2bccd4d53218bfea2320b7e82ff5b8f9f12da58fc4bd816edc081b72e5cae872df72f71da8fa7f95616278adcf6e8f6189317002b17f7eb6cd3ca435223f6a03c4b5489a34512029f8d4d191f7506c9be6e7c0c313fe241e3eb839760b2fdb1ceec8c6b93c7ded5475bb2ae3401ef07eb20cd73d88c008950eeb8ae45f5d0f5ba614d23015d928359da7db1b7acdd6e24652151e70327f5678bc42b80b4930db845bea809ecb4e0c3580feaff23d4825cff61be5d785234d9b37effd209b4de1249ba4f0cd09804ec4d88168271be600a351e82827c06defe6d615583cb04a0c5b92dbd0bf7d326ac304196379d7690699090158508e49d7772553bd0bb6756538a44c4348ce70ba1211c171197c89ad561c0946c763f4d26dc918a8f24e9282e8635990857470a19e3dd6a3fe9b039844c1875e546dfc240bdf09a047ab27dc1de61e6d22b90d51d9bb6f93f0dd3520bccaf2cad7bfaf25f5dab8db20fa29919d43a41a79bb13517597ee3f53f03f4d5018ba2a78080068000700000005003100000000000c007e002000000000000000241ccddbf33c5514003300fe80000000000000000000000000000e08002800537100007917f73643d09ea74817b1ecaf1f30ba123dc488bbad76e6ece6324561c11d49dca1e4fc5b3bd2dc75304e0d6cbc0e2a6f083d03a71892b06051b8066cc6f041883d2a2f251527450d84675cc605278741dfee02039b623efeedcb1ff4e9fa3ef250dbe0579bdc7ce67c35ab7b2d725508efb93d04a8fb0ac33d1134b6f54b60ec90a025e397a9d346adc3e8d0d8f31bbf43d369d7fb29ef5a9009d40a3b621ebf48356224f89eaa22c93da092ac78efe5ec08002c00", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x24e4}], 0xa, &(0x7f000000c7c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32=r2, @ANYRES32, @ANYBLOB="000000001c00e791417700040000000000000000", @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32=r3, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32, @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00'], 0xa8, 0x20040040}, 0x40001) creat(&(0x7f0000000040)='./file0\x00', 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r7) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r9, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) connect$bt_l2cap(r8, &(0x7f0000000080)={0x1f, 0x1, @any, 0x1, 0x1}, 0xe) [ 1536.579661] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (ad4c0000) 19:08:34 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0xfc, 0x0, @private2}, 0x1c) 19:08:34 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005", 0x9}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000f256bcd97d4240ebf0300a003ec517b121b66ceaf65946de73018975a28a3770f47c701d70504000000000000006b86cfba5e16d772d269221414b9da9406ad12e2e4717e7103e052a894962ae411ca375d3c2549f4fb0d5654fc9e641f5dd20803928b69bd2138eb5d09fabdc96bc3cb22ad151e1ee50a0c03b4c1688e830a1d552f5590a74a6699f38857a60f94f8a36f1a8a7da7a6d6b174e55a559ebf302fa04f7096fbd8f401ba8c78978d97cd20f63b6d348978bca796f852b942873fab9777682e5e914b6c9eaf345dc93178f3f2dd287b89820000000000000000000000ec00001c9e746babb574b1fa04abe51dd4000320ee5c3b4c871dd965c387dd3ab0c12e7af8ce58c8a277f3acd07a96195163b040e7ef0ed30ab6abeaebb9086af9d225f218f31179e4b984391e7538b4ee3c886f3ff0581f8ce0ce3bfff615000000000000000000"]) 19:08:34 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x8, 0x0, @private2}, 0x1c) 19:08:34 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6332f9bfc45e88bc}, 0xff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, 0x0, 0x1, 0x0, 0x0, {0x4}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x20}}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 19:08:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 22) 19:08:34 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x8) 19:08:34 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) stat(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) sendmsg$AUDIT_ADD_RULE(r3, &(0x7f00000006c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x434, 0x3f3, 0x200, 0x70bd2b, 0x25dfdbff, {0x5, 0x1, 0x0, [0x7fffffff, 0xfffffff8, 0x7, 0x3, 0x1, 0x40, 0x56a5be6d, 0x6, 0x8, 0x7, 0x6, 0xffffffff, 0x7, 0xfff, 0x6, 0x6, 0x3, 0x3f, 0x3, 0x400, 0x400, 0x6, 0x88, 0xffffffc0, 0x3, 0x1ff, 0x66334aac, 0x2486, 0x908, 0x1, 0x453, 0x6, 0x7, 0x5, 0x4, 0x6, 0x6, 0x20, 0x200, 0x23, 0x3, 0x7fff, 0x1, 0x1, 0xfffffff8, 0x400, 0x4, 0x9, 0x7, 0x101, 0x8, 0x6, 0xffffff7f, 0x0, 0xffffffff, 0x35f3a762, 0x9, 0x2, 0x5, 0x921, 0xd39e, 0x6, 0x6, 0x81], [0x353, 0x3, 0x656bce9, 0xc1a0000, 0x9, 0xa4, 0x5, 0x6, 0x7, 0xfffffff8, 0x3, 0xd2, 0x5, 0x105c, 0x2, 0x2, 0x7, 0xfa, 0x3, 0x20, 0xffff, 0x8000, 0x10000, 0x5, 0x7fffffff, 0x7, 0xb4, 0x2, 0x8, 0x3, 0xfff, 0xfffffff7, 0x0, 0x6, 0x6, 0x1f, 0x6, 0x7fffffff, 0x5, 0x8000, 0x101, 0xe54, 0x5f, 0xf6, 0x5, 0x81, 0x0, 0x4, 0x59ee, 0x80000000, 0xfffffffc, 0x3, 0x5, 0xb89, 0x7fff, 0x65, 0x3, 0x4, 0x0, 0x80000001, 0x100, 0x5, 0x9], [0x43, 0x1f, 0x5, 0x6, 0x800, 0x4, 0xc6c, 0x6, 0x321a, 0x7ff, 0x400, 0x4116, 0x1f, 0x1, 0x6, 0x6, 0x10000, 0x1, 0xca, 0x5, 0x6, 0x8, 0x2, 0x4f, 0x7, 0xbc, 0x9, 0x1, 0x0, 0xdb, 0x5, 0x10001, 0xffff0000, 0x0, 0x8, 0xfffffffc, 0x7, 0x10001, 0x3f, 0x30e0, 0x4, 0x0, 0x7f0, 0x1, 0x63fa, 0x1, 0x74e, 0x7, 0x74, 0x34da, 0xc1da, 0x8, 0x80000, 0x3, 0x0, 0x1, 0x1, 0xd01, 0x9, 0x20000000, 0xfffffeff, 0x100, 0x0, 0x8], [0x81, 0x401, 0x10001, 0x2, 0xfffffffc, 0x9, 0x7ff, 0x80000000, 0x1, 0x9, 0x528, 0x5, 0x3, 0x40, 0x344, 0xfffff5ea, 0x1, 0x800, 0x0, 0x3ff, 0x6, 0x3, 0x1, 0x7, 0x9, 0x9294, 0x5, 0x5, 0x3, 0x7, 0x292, 0x7, 0x7, 0x2, 0x9c, 0x88, 0x962b, 0xfffffffa, 0x1000, 0xbf, 0x80000000, 0xc1f6, 0x8001, 0x96cc, 0xff, 0x2, 0x7, 0xbdad, 0xffff, 0x81, 0x401, 0x7, 0x2, 0x8, 0x1000, 0x1f, 0x1, 0x954, 0x9a58, 0x9, 0xf1a, 0x0, 0xfdd, 0x2026], 0x11, ['*.]*#/]-(\x00', '\x00', '+}+\x00', ')\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x434}, 0x1, 0x0, 0x0, 0x8040}, 0x4000194) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f0000000200)={0x1, 0x2, {0x1, 0x2, 0x0, 0x1, 0xfffffffc}, 0x9b95}) clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:08:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x5) [ 1550.640161] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (ad4c0000) [ 1550.653645] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1550.655620] EXT4-fs (loop2): group descriptors corrupted! [ 1550.688345] FAULT_INJECTION: forcing a failure. [ 1550.688345] name failslab, interval 1, probability 0, space 0, times 0 [ 1550.690104] CPU: 0 PID: 14150 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1550.690918] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1550.691880] Call Trace: [ 1550.692196] dump_stack+0x107/0x167 [ 1550.692631] should_fail.cold+0x5/0xa [ 1550.693083] should_failslab+0x5/0x20 [ 1550.693529] __kmalloc_track_caller+0x79/0x3c0 [ 1550.694089] ? security_context_to_sid_core+0xb4/0x820 [ 1550.694700] kmemdup_nul+0x2d/0xa0 [ 1550.695118] security_context_to_sid_core+0xb4/0x820 [ 1550.695716] ? security_compute_sid.part.0+0x1670/0x1670 [ 1550.696341] ? do_raw_spin_lock+0x121/0x260 [ 1550.696850] ? rwlock_bug.part.0+0x90/0x90 [ 1550.697340] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1550.697913] ? do_raw_spin_unlock+0x4f/0x220 [ 1550.698442] ? _raw_spin_unlock+0x1a/0x30 [ 1550.698940] security_context_to_sid+0x35/0x50 [ 1550.699488] selinux_kernfs_init_security+0x198/0x4c0 [ 1550.700107] ? selinux_file_mprotect+0x600/0x600 [ 1550.700662] ? find_held_lock+0x2c/0x110 [ 1550.701155] ? __kernfs_new_node+0x2ad/0x850 [ 1550.701682] ? lock_downgrade+0x6d0/0x6d0 [ 1550.702172] ? rwlock_bug.part.0+0x90/0x90 [ 1550.702680] security_kernfs_init_security+0x4e/0xb0 [ 1550.703287] __kernfs_new_node+0x531/0x850 [ 1550.703793] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1550.704370] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1550.704944] ? pcpu_alloc+0x12a/0x12f0 [ 1550.705408] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1550.706037] kernfs_create_dir_ns+0x9c/0x230 [ 1550.706569] cgroup_mkdir+0x318/0xfc0 [ 1550.707031] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1550.707594] kernfs_iop_mkdir+0x14d/0x1e0 [ 1550.708094] vfs_mkdir+0x41f/0x660 [ 1550.708513] do_mkdirat+0x145/0x2a0 [ 1550.708953] ? user_path_create+0xf0/0xf0 [ 1550.709446] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1550.710079] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1550.710695] do_syscall_64+0x33/0x40 [ 1550.711143] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1550.711750] RIP: 0033:0x7fae7cd32b19 [ 1550.712189] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1550.714393] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1550.715302] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1550.716151] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1550.717009] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1550.717874] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1550.718715] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 19:08:34 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6332f9bfc45e88bc}, 0xff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, 0x0, 0x1, 0x0, 0x0, {0x4}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x20}}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x20, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4014}, 0x40) 19:08:34 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000002400000005", 0x9}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:08:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 23) 19:08:34 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0xb) 19:08:34 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x160006, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0xc00, 0x0) clone3(&(0x7f0000001e00)={0x1200400, &(0x7f00000019c0), &(0x7f0000001bc0)=0x0, &(0x7f0000001b80), {0xbe}, &(0x7f0000001f00)=""/149, 0x95, &(0x7f0000001d00)=""/170, &(0x7f0000001dc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3}, 0x58) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x57, 0x5c, 0x0, 0x9, 0x0, 0x0, 0x42, 0x7, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x100000000, 0x6}, 0x100, 0x0, 0x2, 0x7, 0x3800000, 0x100, 0x7e6, 0x0, 0xe0, 0x0, 0x5}, r5, 0x5, r4, 0x12) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x81, 0x48, 0x80, 0x0, 0x1, 0x20, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x0, @perf_bp={&(0x7f0000000140), 0x8}, 0x6b1806cce93e1b17, 0x100000001, 0x81, 0x4, 0x9, 0x6e2, 0x2, 0x0, 0x8, 0x0, 0x40}, r5, 0xb, 0xffffffffffffffff, 0xd) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) r7 = accept4(r2, &(0x7f0000000200)=@l2tp={0x2, 0x0, @dev}, &(0x7f0000000280)=0x80, 0x800) write$binfmt_elf64(r7, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x3f, 0x5, 0x8, 0x0, 0x3, 0x3b, 0x0, 0x10, 0x40, 0x238, 0x9, 0x8000, 0x38, 0x1, 0x4, 0x7ff, 0x4}, [{0x3, 0xa017, 0x400, 0x5, 0x0, 0x0, 0x7, 0x1ff}], "0528ad3abc463c33d685d5e52042bb3980f84b518137cdf3f2adc2c4e83af481e1d07dd06e24954e466fd96856b175c328c6a2dae242b2ad1a46d930231f7b9b617d7cf4fac0f55acf2e79939853389e63f319bbfccc40e9ea2ad1af8c767c0333ce3146a406861c4b51f6a88835bb06f900cea0b5157e4ddcaa3c7727de62572cc14c274db20cf28154789a6727710a5286cb2a", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa0c) bind$bt_l2cap(r6, &(0x7f00000000c0)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x2, 0x2}, 0xe) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:08:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x5) [ 1550.921537] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (ad4c0000) [ 1551.029750] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 1551.030890] EXT4-fs (loop2): group descriptors corrupted! [ 1551.038530] FAULT_INJECTION: forcing a failure. [ 1551.038530] name failslab, interval 1, probability 0, space 0, times 0 [ 1551.040231] CPU: 0 PID: 14275 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1551.041073] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1551.041980] Call Trace: [ 1551.042291] dump_stack+0x107/0x167 [ 1551.042703] should_fail.cold+0x5/0xa [ 1551.043128] ? create_object.isra.0+0x3a/0xa20 [ 1551.043614] ? create_object.isra.0+0x3a/0xa20 [ 1551.044102] should_failslab+0x5/0x20 [ 1551.044514] kmem_cache_alloc+0x5b/0x360 [ 1551.044956] create_object.isra.0+0x3a/0xa20 [ 1551.045430] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1551.045976] __kmalloc_track_caller+0x177/0x3c0 [ 1551.046476] ? security_context_to_sid_core+0xb4/0x820 [ 1551.047037] kmemdup_nul+0x2d/0xa0 [ 1551.047425] security_context_to_sid_core+0xb4/0x820 [ 1551.047971] ? security_compute_sid.part.0+0x1670/0x1670 [ 1551.048549] ? do_raw_spin_lock+0x121/0x260 [ 1551.049035] ? rwlock_bug.part.0+0x90/0x90 [ 1551.049508] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1551.050060] ? do_raw_spin_unlock+0x4f/0x220 [ 1551.050551] ? _raw_spin_unlock+0x1a/0x30 [ 1551.051020] security_context_to_sid+0x35/0x50 [ 1551.051526] selinux_kernfs_init_security+0x198/0x4c0 [ 1551.052110] ? selinux_file_mprotect+0x600/0x600 [ 1551.052632] ? find_held_lock+0x2c/0x110 [ 1551.053089] ? __kernfs_new_node+0x2ad/0x850 [ 1551.053581] ? lock_downgrade+0x6d0/0x6d0 [ 1551.054047] ? rwlock_bug.part.0+0x90/0x90 [ 1551.054525] security_kernfs_init_security+0x4e/0xb0 [ 1551.055091] __kernfs_new_node+0x531/0x850 [ 1551.055566] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1551.056095] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1551.056628] ? pcpu_alloc+0x12a/0x12f0 [ 1551.057075] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1551.057670] kernfs_create_dir_ns+0x9c/0x230 [ 1551.058165] cgroup_mkdir+0x318/0xfc0 [ 1551.058594] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1551.059115] kernfs_iop_mkdir+0x14d/0x1e0 [ 1551.059581] vfs_mkdir+0x41f/0x660 [ 1551.059978] do_mkdirat+0x145/0x2a0 [ 1551.060385] ? user_path_create+0xf0/0xf0 [ 1551.060850] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1551.061432] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1551.062015] do_syscall_64+0x33/0x40 [ 1551.062430] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1551.063002] RIP: 0033:0x7fae7cd32b19 [ 1551.063417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1551.065454] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1551.066317] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1551.067115] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1551.067911] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1551.068708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1551.069502] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 19:08:50 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0xe, 0x0, @private2}, 0x1c) 19:08:50 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6332f9bfc45e88bc}, 0xff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, 0x0, 0x1, 0x0, 0x0, {0x4}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x20}}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup(r2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 19:08:50 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x218, 0x0, @private2}, 0x1c) 19:08:50 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0xc) 19:08:50 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="030000002400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000f256bcd97d4240ebf0300a003ec517b121b66ceaf65946de73018975a28a3770f47c701d70504000000000000006b86cfba5e16d772d269221414b9da9406ad12e2e4717e7103e052a894962ae411ca375d3c2549f4fb0d5654fc9e641f5dd20803928b69bd2138eb5d09fabdc96bc3cb22ad151e1ee50a0c03b4c1688e830a1d552f5590a74a6699f38857a60f94f8a36f1a8a7da7a6d6b174e55a559ebf302fa04f7096fbd8f401ba8c78978d97cd20f63b6d348978bca796f852b942873fab9777682e5e914b6c9eaf345dc93178f3f2dd287b89820000000000000000000000ec00001c9e746babb574b1fa04abe51dd4000320ee5c3b4c871dd965c387dd3ab0c12e7af8ce58c8a277f3acd07a96195163b040e7ef0ed30ab6abeaebb9086af9d225f218f31179e4b984391e7538b4ee3c886f3ff0581f8ce0ce3bfff615000000000000000000"]) 19:08:50 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x40003, 0x20) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:08:50 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 24) 19:08:50 executing program 0: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x4040, 0x7e) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x7, 0x10000, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xd, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r3, &(0x7f0000000a00)=ANY=[], 0x98a) readv(r3, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) readv(0xffffffffffffffff, 0x0, 0x0) acct(&(0x7f0000000040)='./file0\x00') unshare(0x48020200) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r5) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) recvmsg$unix(r4, &(0x7f0000000440)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000140)=""/151, 0x97}, {&(0x7f0000000200)=""/176, 0xb0}, {&(0x7f0000000300)=""/100, 0x64}], 0x3, &(0x7f00000003c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10041) [ 1567.196780] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (ad4c0000) [ 1567.235550] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1567.276676] FAULT_INJECTION: forcing a failure. [ 1567.276676] name failslab, interval 1, probability 0, space 0, times 0 [ 1567.279643] CPU: 0 PID: 14306 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1567.281053] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1567.282828] Call Trace: [ 1567.283402] dump_stack+0x107/0x167 [ 1567.284182] should_fail.cold+0x5/0xa [ 1567.284991] should_failslab+0x5/0x20 [ 1567.285792] __kmalloc_track_caller+0x79/0x3c0 [ 1567.286853] ? sidtab_sid2str_get+0x17e/0x670 [ 1567.287813] kmemdup+0x23/0x50 [ 1567.288507] sidtab_sid2str_get+0x17e/0x670 [ 1567.289448] sidtab_entry_to_string+0x33/0x110 [ 1567.290421] security_sid_to_context_core+0x33d/0x570 [ 1567.291494] selinux_kernfs_init_security+0x234/0x4c0 [ 1567.292540] ? selinux_file_mprotect+0x600/0x600 [ 1567.293546] ? find_held_lock+0x2c/0x110 [ 1567.294401] ? __kernfs_new_node+0x2ad/0x850 [ 1567.295322] ? rwlock_bug.part.0+0x90/0x90 [ 1567.296198] security_kernfs_init_security+0x4e/0xb0 [ 1567.297217] __kernfs_new_node+0x531/0x850 [ 1567.298099] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1567.299063] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1567.300032] ? pcpu_alloc+0x12a/0x12f0 [ 1567.300835] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1567.301902] kernfs_create_dir_ns+0x9c/0x230 [ 1567.302806] cgroup_mkdir+0x318/0xfc0 [ 1567.303581] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1567.304535] kernfs_iop_mkdir+0x14d/0x1e0 [ 1567.305378] vfs_mkdir+0x41f/0x660 [ 1567.306107] do_mkdirat+0x145/0x2a0 [ 1567.306845] ? user_path_create+0xf0/0xf0 [ 1567.307684] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1567.308736] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1567.309791] do_syscall_64+0x33/0x40 [ 1567.310560] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1567.311586] RIP: 0033:0x7fae7cd32b19 [ 1567.312337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1567.316025] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1567.317554] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1567.319001] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1567.320429] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1567.321923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1567.323417] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 19:08:50 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="030000002400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000f256bcd97d4240ebf0300a003ec517b121b66ceaf65946de73018975a28a3770f47c701d70504000000000000006b86cfba5e16d772d269221414b9da9406ad12e2e4717e7103e052a894962ae411ca375d3c2549f4fb0d5654fc9e641f5dd20803928b69bd2138eb5d09fabdc96bc3cb22ad151e1ee50a0c03b4c1688e830a1d552f5590a74a6699f38857a60f94f8a36f1a8a7da7a6d6b174e55a559ebf302fa04f7096fbd8f401ba8c78978d97cd20f63b6d348978bca796f852b942873fab9777682e5e914b6c9eaf345dc93178f3f2dd287b89820000000000000000000000ec00001c9e746babb574b1fa04abe51dd4000320ee5c3b4c871dd965c387dd3ab0c12e7af8ce58c8a277f3acd07a96195163b040e7ef0ed30ab6abeaebb9086af9d225f218f31179e4b984391e7538b4ee3c886f3ff0581f8ce0ce3bfff615000000000000000000"]) 19:08:50 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6332f9bfc45e88bc}, 0xff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, 0x0, 0x1, 0x0, 0x0, {0x4}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x20}}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup(r2) 19:08:50 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0xd) 19:08:50 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 25) [ 1567.530090] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 19:08:51 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) r3 = getegid() stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000080)='rxrpc_s\x00', &(0x7f0000000300)=@keyring={'key_or_keyring:', r2}) keyctl$chown(0x4, r2, 0xee01, r3) fchown(r0, r1, r3) r4 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r4, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r4, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r5) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r6, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 1567.546980] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (ad4c0000) 19:08:51 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="030000002400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) [ 1567.680608] FAULT_INJECTION: forcing a failure. [ 1567.680608] name failslab, interval 1, probability 0, space 0, times 0 [ 1567.683058] CPU: 0 PID: 14409 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1567.684454] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1567.686155] Call Trace: [ 1567.686699] dump_stack+0x107/0x167 [ 1567.687441] should_fail.cold+0x5/0xa [ 1567.688213] ? create_object.isra.0+0x3a/0xa20 [ 1567.689137] should_failslab+0x5/0x20 [ 1567.689922] kmem_cache_alloc+0x5b/0x360 [ 1567.690744] ? sidtab_sid2str_get+0x65/0x670 [ 1567.691637] create_object.isra.0+0x3a/0xa20 [ 1567.692525] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1567.693561] __kmalloc_track_caller+0x177/0x3c0 [ 1567.694527] ? sidtab_sid2str_get+0x17e/0x670 [ 1567.695443] kmemdup+0x23/0x50 [ 1567.696101] sidtab_sid2str_get+0x17e/0x670 [ 1567.696992] sidtab_entry_to_string+0x33/0x110 [ 1567.697942] security_sid_to_context_core+0x33d/0x570 [ 1567.698995] selinux_kernfs_init_security+0x234/0x4c0 [ 1567.700057] ? selinux_file_mprotect+0x600/0x600 [ 1567.701028] ? find_held_lock+0x2c/0x110 [ 1567.701888] ? __kernfs_new_node+0x2ad/0x850 [ 1567.702781] ? rwlock_bug.part.0+0x90/0x90 [ 1567.703663] security_kernfs_init_security+0x4e/0xb0 [ 1567.704689] __kernfs_new_node+0x531/0x850 [ 1567.705566] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1567.706559] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1567.707527] ? pcpu_alloc+0x12a/0x12f0 [ 1567.708326] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1567.709379] kernfs_create_dir_ns+0x9c/0x230 [ 1567.710291] cgroup_mkdir+0x318/0xfc0 [ 1567.711071] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1567.712034] kernfs_iop_mkdir+0x14d/0x1e0 [ 1567.712879] vfs_mkdir+0x41f/0x660 [ 1567.713606] do_mkdirat+0x145/0x2a0 [ 1567.714356] ? user_path_create+0xf0/0xf0 [ 1567.715234] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1567.716297] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1567.717378] do_syscall_64+0x33/0x40 [ 1567.718159] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1567.719217] RIP: 0033:0x7fae7cd32b19 [ 1567.719988] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1567.723772] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1567.725338] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1567.726826] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1567.728293] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1567.729745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1567.731207] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 [ 1567.829187] Process accounting resumed [ 1567.847265] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 19:09:03 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x240, 0x0, @private2}, 0x1c) 19:09:03 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0xe) 19:09:03 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x10, 0x0, @private2}, 0x1c) 19:09:03 executing program 0: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x4040, 0x7e) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x7, 0x10000, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xd, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r3, &(0x7f0000000a00)=ANY=[], 0x98a) readv(r3, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) readv(0xffffffffffffffff, 0x0, 0x0) acct(&(0x7f0000000040)='./file0\x00') unshare(0x48020200) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r5) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) recvmsg$unix(r4, &(0x7f0000000440)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000140)=""/151, 0x97}, {&(0x7f0000000200)=""/176, 0xb0}, {&(0x7f0000000300)=""/100, 0x64}], 0x3, &(0x7f00000003c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10041) 19:09:03 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6332f9bfc45e88bc}, 0xff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, 0x0, 0x1, 0x0, 0x0, {0x4}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x20}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 19:09:03 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x1}, 0xe) pwritev2(r2, &(0x7f0000000080), 0x0, 0x7, 0x9, 0xc) 19:09:03 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 26) 19:09:03 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000002400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) [ 1580.387772] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (ad4c0000) [ 1580.399216] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 19:09:03 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000002400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000f256bcd97d4240ebf0300a003ec517b121b66ceaf65946de73018975a28a3770f47c701d70504000000000000006b86cfba5e16d772d269221414b9da9406ad12e2e4717e7103e052a894962ae411ca375d3c2549f4fb0d5654fc9e641f5dd20803928b69bd2138eb5d09fabdc96bc3cb22ad151e1ee50a0c03b4c1688e830a1d552f5590a74a6699f38857a60f94f8a36f1a8a7da7a6d6b174e55a559ebf302fa04f7096fbd8f401ba8c78978d97cd20f63b6d348978bca796f852b942873fab9777682e5e914b6c9eaf345dc93178f3f2dd287b89820000000000000000000000ec00001c9e746babb574b1fa04abe51dd4000320ee5c3b4c871dd965c387dd3ab0c12e7af8ce58c8a277f3acd07a96195163b040e7ef0ed30ab6abeaebb9086af9d225f218f31179e4b984391e7538b4ee3c886f3ff0581f8ce0ce3bfff615000000000000000000"]) [ 1580.475731] FAULT_INJECTION: forcing a failure. [ 1580.475731] name failslab, interval 1, probability 0, space 0, times 0 [ 1580.479488] CPU: 0 PID: 14457 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1580.481117] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1580.483075] Call Trace: [ 1580.483704] dump_stack+0x107/0x167 [ 1580.484572] should_fail.cold+0x5/0xa [ 1580.485483] ? __kernfs_iattrs+0xbc/0x470 [ 1580.486464] should_failslab+0x5/0x20 [ 1580.487366] kmem_cache_alloc+0x5b/0x360 [ 1580.488327] __kernfs_iattrs+0xbc/0x470 [ 1580.489263] kernfs_xattr_set+0x2b/0x80 [ 1580.490234] selinux_kernfs_init_security+0x268/0x4c0 [ 1580.491423] ? selinux_file_mprotect+0x600/0x600 [ 1580.492535] ? find_held_lock+0x2c/0x110 [ 1580.493502] ? __kernfs_new_node+0x2ad/0x850 [ 1580.494559] ? rwlock_bug.part.0+0x90/0x90 [ 1580.495575] security_kernfs_init_security+0x4e/0xb0 [ 1580.496792] __kernfs_new_node+0x531/0x850 [ 1580.497796] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1580.498930] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1580.500066] ? pcpu_alloc+0x12a/0x12f0 [ 1580.500996] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1580.502244] kernfs_create_dir_ns+0x9c/0x230 [ 1580.503290] cgroup_mkdir+0x318/0xfc0 [ 1580.504202] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1580.505316] kernfs_iop_mkdir+0x14d/0x1e0 [ 1580.506327] vfs_mkdir+0x41f/0x660 [ 1580.507170] do_mkdirat+0x145/0x2a0 [ 1580.508028] ? user_path_create+0xf0/0xf0 [ 1580.509012] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1580.510260] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1580.511481] do_syscall_64+0x33/0x40 [ 1580.512358] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1580.513550] RIP: 0033:0x7fae7cd32b19 [ 1580.514425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1580.518675] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1580.520436] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1580.522106] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1580.523757] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1580.525404] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1580.527084] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 19:09:04 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6332f9bfc45e88bc}, 0xff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={0x20, 0x0, 0x1, 0x0, 0x0, {0x4}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x20}}, 0x0) 19:09:04 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = dup2(r0, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000002c0)) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x80000) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0xc00, 0x0) clone3(&(0x7f0000001e00)={0x1200400, &(0x7f00000019c0), &(0x7f0000001bc0)=0x0, &(0x7f0000001b80), {0xbe}, &(0x7f0000001f00)=""/149, 0x95, &(0x7f0000001d00)=""/170, &(0x7f0000001dc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3}, 0x58) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x57, 0x5c, 0x0, 0x9, 0x0, 0x0, 0x42, 0x7, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x100000000, 0x6}, 0x100, 0x0, 0x2, 0x7, 0x3800000, 0x100, 0x7e6, 0x0, 0xe0, 0x0, 0x5}, r7, 0x5, r6, 0x12) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000140)={0x0, 0x9, 0x6, 0x2, 0x8000, 0x9}) fcntl$lock(r3, 0x24, &(0x7f00000000c0)={0x2, 0x0, 0x637, 0x3, r7}) openat(r5, &(0x7f0000000080)='./file0\x00', 0x68341, 0x9e) 19:09:04 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x10) [ 1580.641777] Process accounting resumed 19:09:04 executing program 0: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x4040, 0x7e) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x7, 0x10000, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xd, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r3, &(0x7f0000000a00)=ANY=[], 0x98a) readv(r3, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) readv(0xffffffffffffffff, 0x0, 0x0) acct(&(0x7f0000000040)='./file0\x00') unshare(0x48020200) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r5) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) recvmsg$unix(r4, &(0x7f0000000440)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000140)=""/151, 0x97}, {&(0x7f0000000200)=""/176, 0xb0}, {&(0x7f0000000300)=""/100, 0x64}], 0x3, &(0x7f00000003c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10041) [ 1580.716183] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 19:09:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 27) [ 1580.744661] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (ad4c0000) 19:09:04 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6332f9bfc45e88bc}, 0xff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) 19:09:04 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x12) [ 1580.908629] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (ad4c0000) [ 1580.910232] FAULT_INJECTION: forcing a failure. [ 1580.910232] name failslab, interval 1, probability 0, space 0, times 0 [ 1580.912644] CPU: 0 PID: 14581 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1580.914046] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1580.915712] Call Trace: [ 1580.916254] dump_stack+0x107/0x167 [ 1580.917002] should_fail.cold+0x5/0xa [ 1580.917884] ? create_object.isra.0+0x3a/0xa20 [ 1580.918813] should_failslab+0x5/0x20 [ 1580.919595] kmem_cache_alloc+0x5b/0x360 [ 1580.920412] ? find_held_lock+0x2c/0x110 [ 1580.921233] create_object.isra.0+0x3a/0xa20 [ 1580.922129] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1580.923165] kmem_cache_alloc+0x159/0x360 [ 1580.924013] __kernfs_iattrs+0xbc/0x470 [ 1580.924821] kernfs_xattr_set+0x2b/0x80 [ 1580.925631] selinux_kernfs_init_security+0x268/0x4c0 [ 1580.926684] ? selinux_file_mprotect+0x600/0x600 [ 1580.927640] ? find_held_lock+0x2c/0x110 [ 1580.928470] ? __kernfs_new_node+0x2ad/0x850 [ 1580.929369] ? rwlock_bug.part.0+0x90/0x90 [ 1580.930235] security_kernfs_init_security+0x4e/0xb0 [ 1580.931259] __kernfs_new_node+0x531/0x850 [ 1580.932121] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1580.933091] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1580.934064] ? pcpu_alloc+0x12a/0x12f0 [ 1580.934863] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1580.935925] kernfs_create_dir_ns+0x9c/0x230 [ 1580.936821] cgroup_mkdir+0x318/0xfc0 [ 1580.937596] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1580.938583] kernfs_iop_mkdir+0x14d/0x1e0 [ 1580.939420] vfs_mkdir+0x41f/0x660 [ 1580.940150] do_mkdirat+0x145/0x2a0 [ 1580.940891] ? user_path_create+0xf0/0xf0 [ 1580.941736] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1580.942810] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1580.943848] do_syscall_64+0x33/0x40 [ 1580.944598] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1580.945625] RIP: 0033:0x7fae7cd32b19 [ 1580.946400] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1580.950098] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1580.951630] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1580.953065] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1580.954516] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1580.955952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1580.957394] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 [ 1581.032066] Process accounting resumed 19:09:19 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="030000002400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:09:19 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0xd) 19:09:19 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000080)=ANY=[@ANYBLOB="010002000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r2, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r2, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 19:09:19 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000480)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6332f9bfc45e88bc}, 0xff) 19:09:19 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 28) 19:09:19 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x18) 19:09:19 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x60, 0x0, @private2}, 0x1c) 19:09:19 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x2fc, 0x0, @private2}, 0x1c) [ 1596.019190] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1596.037306] FAULT_INJECTION: forcing a failure. [ 1596.037306] name failslab, interval 1, probability 0, space 0, times 0 [ 1596.039787] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (ad4c0000) [ 1596.042000] CPU: 1 PID: 14712 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1596.043419] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1596.045310] Call Trace: [ 1596.045984] dump_stack+0x107/0x167 [ 1596.046813] should_fail.cold+0x5/0xa [ 1596.047598] ? kvmalloc_node+0x119/0x170 [ 1596.048433] should_failslab+0x5/0x20 [ 1596.049210] __kmalloc_node+0x76/0x4b0 [ 1596.050008] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1596.051004] kvmalloc_node+0x119/0x170 [ 1596.051807] simple_xattr_alloc+0x43/0xa0 [ 1596.052752] simple_xattr_set+0x75/0x610 [ 1596.053594] kernfs_xattr_set+0x50/0x80 [ 1596.054420] selinux_kernfs_init_security+0x268/0x4c0 [ 1596.055614] ? selinux_file_mprotect+0x600/0x600 [ 1596.056701] ? find_held_lock+0x2c/0x110 [ 1596.057544] ? __kernfs_new_node+0x2ad/0x850 [ 1596.058467] ? rwlock_bug.part.0+0x90/0x90 [ 1596.059343] security_kernfs_init_security+0x4e/0xb0 [ 1596.060388] __kernfs_new_node+0x531/0x850 [ 1596.061261] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1596.062250] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1596.063231] ? pcpu_alloc+0x12a/0x12f0 [ 1596.064040] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1596.065105] kernfs_create_dir_ns+0x9c/0x230 [ 1596.066011] cgroup_mkdir+0x318/0xfc0 [ 1596.066819] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1596.067791] kernfs_iop_mkdir+0x14d/0x1e0 [ 1596.068646] vfs_mkdir+0x41f/0x660 [ 1596.069382] do_mkdirat+0x145/0x2a0 [ 1596.070125] ? user_path_create+0xf0/0xf0 [ 1596.070982] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1596.072060] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1596.073122] do_syscall_64+0x33/0x40 [ 1596.073884] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1596.074948] RIP: 0033:0x7fae7cd32b19 [ 1596.075710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1596.079471] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1596.081029] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1596.082491] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1596.083946] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1596.085397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1596.086868] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 19:09:19 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040), 0x0, 0x400}, {&(0x7f0000010400)="030000002400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:09:19 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x64) 19:09:19 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x180) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x9) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000280)={0x14}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) (fail_nth: 29) 19:09:19 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x88) 19:09:19 executing program 0: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x4040, 0x7e) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x7, 0x10000, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xd, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r3, &(0x7f0000000a00)=ANY=[], 0x98a) readv(r3, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) readv(0xffffffffffffffff, 0x0, 0x0) acct(&(0x7f0000000040)='./file0\x00') unshare(0x48020200) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r5) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) recvmsg$unix(r4, &(0x7f0000000440)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000140)=""/151, 0x97}, {&(0x7f0000000200)=""/176, 0xb0}, {&(0x7f0000000300)=""/100, 0x64}], 0x3, &(0x7f00000003c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x10041) 19:09:19 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r4, &(0x7f0000000fc0)=[{{&(0x7f00000002c0)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x4004810) ioctl$AUTOFS_IOC_PROTOSUBVER(r4, 0x80049367, &(0x7f0000000080)) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000000c0)=0x20000) [ 1596.366644] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1596.416807] FAULT_INJECTION: forcing a failure. [ 1596.416807] name failslab, interval 1, probability 0, space 0, times 0 [ 1596.419630] CPU: 0 PID: 14724 Comm: syz-executor.5 Not tainted 5.10.159 #1 [ 1596.421052] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1596.422770] Call Trace: [ 1596.423319] dump_stack+0x107/0x167 [ 1596.424082] should_fail.cold+0x5/0xa [ 1596.424868] ? create_object.isra.0+0x3a/0xa20 [ 1596.425807] ? create_object.isra.0+0x3a/0xa20 [ 1596.426766] should_failslab+0x5/0x20 [ 1596.427548] kmem_cache_alloc+0x5b/0x360 [ 1596.428378] ? lock_downgrade+0x6d0/0x6d0 [ 1596.429234] create_object.isra.0+0x3a/0xa20 [ 1596.430143] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1596.431191] __kmalloc_node+0x1ae/0x4b0 [ 1596.432019] kvmalloc_node+0x119/0x170 [ 1596.432824] simple_xattr_alloc+0x43/0xa0 [ 1596.433674] simple_xattr_set+0x75/0x610 [ 1596.434518] kernfs_xattr_set+0x50/0x80 [ 1596.435342] selinux_kernfs_init_security+0x268/0x4c0 [ 1596.436396] ? selinux_file_mprotect+0x600/0x600 [ 1596.437363] ? find_held_lock+0x2c/0x110 [ 1596.438219] ? __kernfs_new_node+0x2ad/0x850 [ 1596.439130] ? rwlock_bug.part.0+0x90/0x90 [ 1596.440008] security_kernfs_init_security+0x4e/0xb0 [ 1596.441053] __kernfs_new_node+0x531/0x850 [ 1596.441927] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 1596.442907] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1596.443896] ? pcpu_alloc+0x12a/0x12f0 [ 1596.444702] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1596.445752] kernfs_create_dir_ns+0x9c/0x230 [ 1596.446675] cgroup_mkdir+0x318/0xfc0 [ 1596.447450] ? cgroup_destroy_locked+0x6f0/0x6f0 [ 1596.448409] kernfs_iop_mkdir+0x14d/0x1e0 [ 1596.449262] vfs_mkdir+0x41f/0x660 [ 1596.449986] do_mkdirat+0x145/0x2a0 [ 1596.450736] ? user_path_create+0xf0/0xf0 [ 1596.451584] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1596.452649] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1596.453692] do_syscall_64+0x33/0x40 [ 1596.454453] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1596.455486] RIP: 0033:0x7fae7cd32b19 [ 1596.456247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1596.459952] RSP: 002b:00007fae7a2a8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1596.461514] RAX: ffffffffffffffda RBX: 00007fae7ce45f60 RCX: 00007fae7cd32b19 [ 1596.462962] RDX: 0000000000000086 RSI: 0000000020000200 RDI: 0000000000000005 [ 1596.464407] RBP: 00007fae7a2a81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1596.465853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1596.467308] R13: 00007ffd13ed003f R14: 00007fae7a2a8300 R15: 0000000000022000 [ 1596.496542] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (ad4c0000) 19:09:20 executing program 2: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000000040), 0x0, 0x400}, {&(0x7f0000010400)="030000002400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 19:09:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000140)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200002802000002844dad4312e1154869dac63e3bc63ec133634c89fc8670a808ff1d10e3e1397d7ce10ab0dbf0a0eafefc61bd4733e466fdaebb4602e788b5fd2a29e5ca49", 0x9f, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000000640)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffff39ffffffffffffffffffffffffffffffffffffff8bcfb7fbd835bbf5ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff2ee7c4509d13b3d5156112f6ae602a51ca7fe3300e78a4840596dcd105c682a2759c99d3b63c46b265246e2977f14791d507785d4b6e7d3f8e5c6f884e50fb07c973829b95cfc1faab1bb34c4143f28817bb505cf7e17850a6988d882dc19c45b60d7f3519e893d986c69b34ab2dca9e27f446b1125fcdda356b37f4", 0x47b, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 19:09:20 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000340)='./file0\x00', 0x102) [ 1596.727379] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1596.728914] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (ad4c0000) 19:09:20 executing program 1: r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, r1, 0x3) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x4, 0x7, 0x100}) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') clone3(&(0x7f00000008c0)={0x1048100, 0x0, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = openat$incfs(r2, &(0x7f0000000080)='.pending_reads\x00', 0x2000, 0x180) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r5, &(0x7f0000000fc0)=[{{&(0x7f00000002c0)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x4004810) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r5, {0x9}}, './file0\x00'}) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r6, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 1596.800813] Process accounting resumed [ 1611.192527] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88800df52410 (size 144): comm "syz-executor.5", pid 14712, jiffies 4296262936 (age 22.599s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 5f 65 9f 63 00 00 00 00 ........_e.c.... 63 af 7b 21 00 00 00 00 5f 65 9f 63 00 00 00 00 c.{!...._e.c.... backtrace: [<0000000088f59dd1>] __kernfs_iattrs+0xbc/0x470 [<0000000022abdedc>] kernfs_xattr_set+0x2b/0x80 [<000000006db9f901>] selinux_kernfs_init_security+0x268/0x4c0 [<000000001fb32d0c>] security_kernfs_init_security+0x4e/0xb0 [<000000009d82bd98>] __kernfs_new_node+0x531/0x850 [<0000000053252681>] kernfs_create_dir_ns+0x9c/0x230 [<0000000047bc04d6>] cgroup_mkdir+0x318/0xfc0 [<0000000091ddc529>] kernfs_iop_mkdir+0x14d/0x1e0 [<000000008e449a26>] vfs_mkdir+0x41f/0x660 [<00000000237b8ce9>] do_mkdirat+0x145/0x2a0 [<000000007accc271>] do_syscall_64+0x33/0x40 [<000000006fb7c0e8>] entry_SYSCALL_64_after_hwframe+0x61/0xc6 BUG: leak checking failed VM DIAGNOSIS: 19:09:43 Registers: info registers vcpu 0 RAX=ffffffff83e208b0 RBX=ffffffff84e322c0 RCX=ffffffff83e085fc RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e20c73 RBP=fffffbfff09c6458 RSP=ffffffff84e07e40 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85670a88 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e208be RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007efe14278858 CR3=0000000016d00000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=656a626f206465636e6572656665726e XMM02=2934343120657a697328203031343235 XMM03=3120646970202c22352e726f74756365 XMM04=2e2e2e2e2e2e2e202030302030302030 XMM05=20303020303020303020303020303020 XMM06=65747962203233207473726966282070 XMM07=32322065676128203633393236323639 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e208b0 RBX=ffff88800852b300 RCX=ffffffff83e085fc RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e20c73 RBP=ffffed10010a5660 RSP=ffff88800856fe78 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85670a88 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e208be RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fff79b23b50 CR3=000000001b3ca000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=0a64656c69616620676e696b63656863 XMM02=31636e75662e6e75522e6c697475736f XMM03=00000000000000000000000000000000 XMM04=79732f225b206e7572206f742064656c XMM05=61656c222022726f7475636578652d7a XMM06=226464615f7478655f626b732220226b XMM07=31207375746174732074697865203a5d XMM08=0000000001a209800000000001a20980 XMM09=0000000001a210400000000001a21040 XMM10=0000000001a213400000000001a21340 XMM11=0000000001a214000000000001a21400 XMM12=0000000001a214c00000000001a214c0 XMM13=00000000019da48000000000019d9940 XMM14=00000000019da90000000000019da900 XMM15=00000000019db20000000000019db080