fffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:15:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:15:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:15:17 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) fsetxattr$security_ima(r0, &(0x7f00000000c0), &(0x7f00000001c0)=@ng={0x4, 0x13, "c4cc09e4dddd2fc1"}, 0xa, 0x1) 18:15:17 executing program 0: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000a, 0x10, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r4, 0x400448dd, &(0x7f0000000380)={0x0, 0x0, "b680db"}) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) r7 = dup2(r5, r6) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1, r8}}, 0x101) syz_io_uring_submit(r3, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x3, 0x6000, @fd=r4, 0xffffffffffffff81, &(0x7f00000001c0)=""/202, 0xca, 0x0, 0x1, {0x0, r8}}, 0x81) r9 = eventfd2(0x0, 0x800) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4303, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r9, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) 18:15:17 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xe803, &(0x7f0000000140)=@un=@abs, 0x80) [ 3157.431752] FAT-fs (loop5): bogus number of reserved sectors [ 3157.433076] FAT-fs (loop5): Can't find a valid FAT filesystem [ 3157.453185] FAT-fs (loop4): bogus number of reserved sectors [ 3157.454920] FAT-fs (loop4): Can't find a valid FAT filesystem 18:15:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:15:17 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x0) 18:15:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:15:17 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xf401, &(0x7f0000000140)=@un=@abs, 0x80) [ 3157.717068] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3157.754464] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3157.864456] FAT-fs (loop4): bogus number of reserved sectors [ 3157.865808] FAT-fs (loop4): Can't find a valid FAT filesystem 18:15:18 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x0, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:15:18 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:15:18 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x0) [ 3157.927083] FAT-fs (loop5): bogus number of reserved sectors [ 3157.928374] FAT-fs (loop5): Can't find a valid FAT filesystem 18:15:18 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xfc00, &(0x7f0000000140)=@un=@abs, 0x80) 18:15:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) [ 3158.243243] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3158.296609] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3158.318170] FAT-fs (loop4): bogus number of reserved sectors [ 3158.319676] FAT-fs (loop4): Can't find a valid FAT filesystem [ 3159.466653] Bluetooth: hci0: command 0x0c1a tx timeout 18:15:33 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x10009fd}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 18:15:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:15:33 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:15:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:15:33 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xfe80, &(0x7f0000000140)=@un=@abs, 0x80) 18:15:33 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x0, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:15:33 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:15:33 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x0) [ 3173.481908] FAT-fs (loop4): bogus number of reserved sectors [ 3173.483365] FAT-fs (loop4): Can't find a valid FAT filesystem [ 3173.529163] FAT-fs (loop5): bogus number of reserved sectors [ 3173.530517] FAT-fs (loop5): Can't find a valid FAT filesystem 18:15:33 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xfec0, &(0x7f0000000140)=@un=@abs, 0x80) 18:15:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) [ 3173.806618] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3173.856564] EXT4-fs (loop0): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3173.883549] FAT-fs (loop4): bogus number of reserved sectors [ 3173.884880] FAT-fs (loop4): Can't find a valid FAT filesystem [ 3173.913605] FAT-fs (loop5): bogus number of reserved sectors [ 3173.914961] FAT-fs (loop5): Can't find a valid FAT filesystem 18:15:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:15:33 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:15:33 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xff00, &(0x7f0000000140)=@un=@abs, 0x80) 18:15:34 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:15:34 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:15:34 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3174.072246] FAULT_INJECTION: forcing a failure. [ 3174.072246] name failslab, interval 1, probability 0, space 0, times 0 [ 3174.075203] CPU: 0 PID: 20753 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3174.076636] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3174.078319] Call Trace: [ 3174.078867] dump_stack+0x107/0x167 [ 3174.079638] should_fail.cold+0x5/0xa [ 3174.080437] ? __do_sys_memfd_create+0xfb/0x450 [ 3174.081413] should_failslab+0x5/0x20 [ 3174.082200] __kmalloc+0x72/0x390 [ 3174.082940] __do_sys_memfd_create+0xfb/0x450 [ 3174.083863] ? ksys_write+0x1a9/0x260 [ 3174.084636] ? memfd_file_seals_ptr+0x170/0x170 [ 3174.085587] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3174.086654] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3174.087716] do_syscall_64+0x33/0x40 [ 3174.088486] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3174.089527] RIP: 0033:0x7f5b6609ab19 [ 3174.090286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3174.094051] RSP: 002b:00007f5b6360ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3174.095625] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f5b6609ab19 [ 3174.097087] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f5b660f40fb [ 3174.098544] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 3174.099988] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3174.101432] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 3174.376109] EXT4-fs (loop0): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3174.380274] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:15:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:15:52 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x34000, &(0x7f0000000140)=@un=@abs, 0x80) 18:15:52 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(r0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x8800000) setsockopt$bt_hci_HCI_TIME_STAMP(r4, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) r5 = openat$cgroup(r2, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0, 0x0}, &(0x7f0000000800)=0xc) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x1001000, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r6}}, {@access_client}, {@cache_fscache}, {@loose}], [{@euid_lt={'euid<', 0xee01}}]}}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r7, 0xc0185879, &(0x7f00000000c0)={0x0, 0x100000000}) 18:15:52 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 2) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:15:52 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:15:52 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:15:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_HEADER(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0xc, 0x6, 0x301, 0x0, 0x0, {0x7, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20080000}, 0x1) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r2 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x1400) sendmsg$IPCTNL_MSG_CT_GET_DYING(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x6, 0x1, 0x101, 0x0, 0x0, {0x1, 0x0, 0x7}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000001}, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000880)={0x14, 0x4a, 0x69844ea0a6ddcd11, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) 18:15:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:15:52 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x40000, &(0x7f0000000140)=@un=@abs, 0x80) 18:15:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000001c40)={0x0, 0x7}, 0x4) close(r0) [ 3192.904803] FAT-fs (loop5): bogus number of reserved sectors [ 3192.906263] FAT-fs (loop5): Can't find a valid FAT filesystem [ 3192.907562] FAULT_INJECTION: forcing a failure. [ 3192.907562] name failslab, interval 1, probability 0, space 0, times 0 [ 3192.910234] CPU: 0 PID: 20779 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3192.911644] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3192.913367] Call Trace: [ 3192.913895] dump_stack+0x107/0x167 [ 3192.914637] should_fail.cold+0x5/0xa [ 3192.915396] ? create_object.isra.0+0x3a/0xa20 [ 3192.915790] FAT-fs (loop4): bogus number of reserved sectors [ 3192.916339] should_failslab+0x5/0x20 [ 3192.917511] FAT-fs (loop4): Can't find a valid FAT filesystem [ 3192.918235] kmem_cache_alloc+0x5b/0x310 [ 3192.918267] create_object.isra.0+0x3a/0xa20 [ 3192.921108] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3192.922159] __kmalloc+0x16e/0x390 [ 3192.922890] __do_sys_memfd_create+0xfb/0x450 [ 3192.923795] ? ksys_write+0x1a9/0x260 [ 3192.924550] ? memfd_file_seals_ptr+0x170/0x170 [ 3192.925492] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3192.926546] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3192.927589] do_syscall_64+0x33/0x40 [ 3192.928346] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3192.929387] RIP: 0033:0x7f5b6609ab19 [ 3192.930147] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3192.933849] RSP: 002b:00007f5b6360ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3192.935386] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f5b6609ab19 [ 3192.936836] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f5b660f40fb [ 3192.938268] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 3192.939726] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3192.941173] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 18:15:53 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:15:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:15:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:15:53 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3193.239393] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:15:53 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x80000, &(0x7f0000000140)=@un=@abs, 0x80) [ 3193.358120] FAT-fs (loop4): bogus number of reserved sectors [ 3193.359656] FAT-fs (loop4): Can't find a valid FAT filesystem [ 3193.404334] FAT-fs (loop5): bogus number of reserved sectors [ 3193.405889] FAT-fs (loop5): Can't find a valid FAT filesystem [ 3193.454324] FAULT_INJECTION: forcing a failure. [ 3193.454324] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3193.457147] CPU: 1 PID: 20826 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3193.458453] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3193.460035] Call Trace: [ 3193.460542] dump_stack+0x107/0x167 [ 3193.461241] should_fail.cold+0x5/0xa [ 3193.461975] _copy_from_user+0x2e/0x1b0 [ 3193.462738] __do_sys_memfd_create+0x16d/0x450 [ 3193.463621] ? memfd_file_seals_ptr+0x170/0x170 [ 3193.464529] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3193.465689] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3193.466835] do_syscall_64+0x33/0x40 [ 3193.467663] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3193.468825] RIP: 0033:0x7f5b6609ab19 [ 3193.469654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3193.473725] RSP: 002b:00007f5b6360ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3193.475410] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f5b6609ab19 [ 3193.477012] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f5b660f40fb [ 3193.478284] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3193.478597] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 3193.478609] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3193.478621] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 18:16:06 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x400300, &(0x7f0000000140)=@un=@abs, 0x80) 18:16:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000140)='.pending_reads\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) r3 = dup2(r1, r0) openat(r3, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x3) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000240)={0x6, 0x80, 0xe5, 0x5, 0x0, 0x4, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0x9}, 0x40008, 0x7, 0x0, 0x7, 0x0, 0x7, 0x9, 0x0, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0x3) signalfd(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r1, 0x80489439, 0x0) lseek(r2, 0x0, 0x2) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x128) copy_file_range(r4, 0x0, r2, 0x0, 0x200f5ef, 0x0) 18:16:06 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:16:06 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:16:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:16:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:16:06 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:16:06 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext2\x00', &(0x7f0000000240)='./file1\x00', 0x1000, 0x6, &(0x7f0000000740)=[{&(0x7f00000002c0)="e9e25764d11587ffc49f0ab4aef70edd328378d7fcd6716bd3386827510f5aabe075c9965237573b24c4f7b55cd5e80c3da2c920ad442c585590d9efae4a296ce70e99fddbdae34fa5324fb5c80e3571b3c9c62ee34913e5eb83640704c6d1406acd27e63147d71bb2a58d2c9ccdfb082ca02b97e421d5c06eebf51a0ee120730fb238e3c7a14c991c5e77fcc55f21baec87dbd918614355d5f723f1e480fad298e547cc0f0b5063a15813f822cafc2a5ab97a4a7da8e1a5a0106e4bacd432c92b2a7b22ae08554a1d2981b5bdee83b1ab940ddaa356be483d04ec5dad2f2221b751c474cb081b67fb595f65443b", 0xee, 0x9}, {&(0x7f00000003c0)="37b6cb4cb3b4a40610b3789268bafc183e3054f988b304973a037931ba918101f182858e2d2301ef4e27adb7f5cb266a075e2322bfaba112654ffd419f02d1a3e3676a48422da75bb7f0c83b442bd4f6cae9ffb0e628e06abc524d6ccd0739a0fa771f3208318bb21ef1f612ff575f14d1066cd21ca35b53aa7fc9b1e4bcada1e1df96e94347f477c2d3d0fac87c11da3c7191fa1f26dfa54cc2c0095d26cf4038c050df609ce5facc9fd8e46a0a9f0ae66d62598c4c13def7e4392df0e2d76aee2b5c10049f4c8ff0f1a6449cc7881b43cca3af5fe794e0f655655d", 0xdc, 0x7}, {&(0x7f00000004c0)="ad04cc23ad2cddc21e77fa0585bcaa470ef7f1973ffb0a66ba69d1b0614892041362aba9abb0bfd7b9a79ca072e102d5ce7d3e32797bdf3f473cd82cae98156640ea972c1ef7c503f840ab17ae3ac4ae2eac5d44538d10164d644e0df6563cfbaaaaa66d9411da594f3fc6387136c1a9732b5af86440f65eb3ce", 0x7a, 0x8000}, {&(0x7f0000000540)="416d79ab3c2fc331d84f28fa3bbe3cbde082c0fb23798bd75335853dd9a53b43f46aae56603e7a7a0ee4f81c035be1f8a3ca60ce1173c3e829550795c721d30fd52acfb8a9cea35a01aa238865822e1664f3303d53a1aa99ede81dcb59e6be9450dab0384e0755d713", 0x69, 0xffffffffffffff42}, {&(0x7f00000005c0)="f91e476f33aca9f1033b8fa479f675016a6418950b2dbf4e7394d824019282cfe6c94af9501267c812803f32e8d5173acea24c0136e1bbb2ab335d275bcd73a8db1a9033f119485387a2e53dc8eb06ab440a6ac35f863503e2338fc2a0541ba1a97098061b4f6d6c8202b21b090a7376aec86812d81a1612bd38550a0feba94e45fc448e67a27027020e5d", 0x8b, 0x7}, {&(0x7f0000000680)="c66ecac57387c009f8755c007c71f2dcf7c14433cad2ad8869e23dac2eaa6eb31845b1415b94a9609850dd565abaab9700404c1ef14c6265468889545bba280a569f98def43f0646ad49b379917d1c2576d6ddfafc2142ba6db4b9c882e5265052f809adbeee8a9e768919e8fa5a79ea33c30378f5fed7f2224993a8feed5cf3e7c4810de91b82fd5a", 0x89, 0x2}], 0x1000080, &(0x7f0000000800)={[], [{@appraise_type}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@hash}, {@smackfshat={'smackfshat', 0x3d, 'vfat\x00'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '#'}}, {@seclabel}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x63, 0x35, 0x38, 0x37, 0x32, 0x7, 0x37], 0x2d, [0x62, 0x39, 0xf9d8eb2da306c1b, 0x38], 0x2d, [0x32, 0x62, 0x63, 0x5], 0x2d, [0x39, 0x30, 0x38, 0x30], 0x2d, [0x38, 0x64, 0x64, 0x35, 0x33, 0x37, 0x1603109871c54f4c, 0x65]}}}, {@euid_gt={'euid>', r0}}]}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0, 0x88) fallocate(r1, 0x0, 0x0, 0x8800000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pwritev2(r3, &(0x7f0000000ac0)=[{&(0x7f0000000940)="f1f40a199b178ea154c91c5dac16ebe5af73e678940b1dce2ed8720c7769c3d364b26deafbe4496b82e960c29c472085a5c9df37ab21ea1a25786a280eb00d331a5d40eaad56a2ca22c71a2df7da80af79295a81f67de02aabedbcc65de42a1e95661dc9da719912b70713fa89abf988898b6eaa8e1a59b97d56c3193eee8bb0dc257282691a474050e051b75f1b630bd4706ae01bb94a63ad56a52c5eda21f5b2a1fe2a03e270f80b284344ce957220a299bab371aadea9d1b633b762f39683213d5911db2b02612490b145c3e9609058ddb1e7cfc161", 0xd7}, {&(0x7f0000000a40)="81c37ac601d85a44d03a92887d57ebeee86bc9d6babbd7047a6924b2c3285fbfcd025b81226a1557f8479bdf9d50d4e1d71d4ed409dd4104dcf03d22468c81ab4ae14434", 0x44}], 0x2, 0x4, 0x100, 0x19) [ 3206.736308] FAT-fs (loop4): bogus number of reserved sectors [ 3206.737544] FAT-fs (loop4): Can't find a valid FAT filesystem [ 3206.751138] FAT-fs (loop5): bogus number of reserved sectors [ 3206.752425] FAT-fs (loop5): Can't find a valid FAT filesystem [ 3206.762269] FAULT_INJECTION: forcing a failure. [ 3206.762269] name failslab, interval 1, probability 0, space 0, times 0 [ 3206.765015] CPU: 1 PID: 20846 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3206.766438] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3206.768149] Call Trace: [ 3206.768685] dump_stack+0x107/0x167 [ 3206.769445] should_fail.cold+0x5/0xa [ 3206.770219] ? shmem_alloc_inode+0x18/0x40 [ 3206.771084] ? shmem_alloc_inode+0x18/0x40 [ 3206.771975] should_failslab+0x5/0x20 [ 3206.772757] kmem_cache_alloc+0x5b/0x310 [ 3206.773582] ? shmem_destroy_inode+0x70/0x70 [ 3206.774476] shmem_alloc_inode+0x18/0x40 [ 3206.775299] ? shmem_destroy_inode+0x70/0x70 [ 3206.776196] alloc_inode+0x63/0x240 [ 3206.776932] new_inode+0x23/0x250 [ 3206.777658] shmem_get_inode+0x15e/0xbc0 [ 3206.778491] __shmem_file_setup+0xb8/0x320 [ 3206.779350] ? _copy_from_user+0xfb/0x1b0 [ 3206.780217] __do_sys_memfd_create+0x275/0x450 [ 3206.781142] ? memfd_file_seals_ptr+0x170/0x170 [ 3206.782105] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3206.783327] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3206.784419] do_syscall_64+0x33/0x40 [ 3206.785234] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3206.786408] RIP: 0033:0x7f5b6609ab19 [ 3206.787179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3206.791268] RSP: 002b:00007f5b6360ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3206.792921] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f5b6609ab19 [ 3206.794518] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f5b660f40fb [ 3206.795983] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 3206.797429] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3206.799137] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 18:16:06 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x1000000, &(0x7f0000000140)=@un=@abs, 0x80) [ 3206.981338] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:16:07 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 5) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:16:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) [ 3207.016313] syz-executor.0 (20848) used greatest stack depth: 23096 bytes left 18:16:07 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x2000000, &(0x7f0000000140)=@un=@abs, 0x80) 18:16:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:16:07 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000001400)=""/53, 0x35) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/i2c_algo_bit', 0x51b041, 0x112) openat(r0, &(0x7f0000000300)='./file1\x00', 0x0, 0x40) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@cache_mmap}, {@cache_none}], [{@smackfsfloor={'smackfsfloor', 0x3d, ':'}}]}}) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x141043, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="400300001400010000000200040000000a00000008000000", @ANYBLOB="11d2c78da976cf9c54b1ccda8931292b54a802eb8b1be03b43664b2ade52220a4349797f4bea9eb897483d6aae7e21cd259b2c0edcaf249fa1a6a2b2d7150d346b9a73c2373362c8"], 0x340}}, 0x0) r2 = openat(0xffffffffffffffff, 0x0, 0x46e2, 0x0) syz_open_dev$vcsn(&(0x7f0000000080), 0x4, 0x100) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) r3 = openat(0xffffffffffffffff, 0x0, 0x46e2, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x1}}, './file1\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000340)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x4007, @fd_index, 0xcb, 0x5, 0x4, 0x19, 0x1}, 0x455) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) [ 3207.097286] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3207.200546] FAULT_INJECTION: forcing a failure. [ 3207.200546] name failslab, interval 1, probability 0, space 0, times 0 [ 3207.203266] CPU: 1 PID: 20874 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3207.204707] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3207.206409] Call Trace: [ 3207.206991] dump_stack+0x107/0x167 [ 3207.207738] should_fail.cold+0x5/0xa [ 3207.208551] ? create_object.isra.0+0x3a/0xa20 [ 3207.209486] should_failslab+0x5/0x20 [ 3207.210255] kmem_cache_alloc+0x5b/0x310 [ 3207.211078] create_object.isra.0+0x3a/0xa20 [ 3207.211977] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3207.213006] kmem_cache_alloc+0x159/0x310 [ 3207.213865] ? shmem_destroy_inode+0x70/0x70 [ 3207.214745] shmem_alloc_inode+0x18/0x40 [ 3207.215571] ? shmem_destroy_inode+0x70/0x70 [ 3207.216471] alloc_inode+0x63/0x240 [ 3207.217199] new_inode+0x23/0x250 [ 3207.217908] shmem_get_inode+0x15e/0xbc0 [ 3207.218735] __shmem_file_setup+0xb8/0x320 [ 3207.219595] ? _copy_from_user+0xfb/0x1b0 [ 3207.220451] __do_sys_memfd_create+0x275/0x450 [ 3207.221373] ? memfd_file_seals_ptr+0x170/0x170 [ 3207.222315] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3207.223378] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3207.224436] do_syscall_64+0x33/0x40 [ 3207.225192] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3207.226225] RIP: 0033:0x7f5b6609ab19 [ 3207.226986] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3207.230750] RSP: 002b:00007f5b6360ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3207.232288] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f5b6609ab19 [ 3207.233719] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f5b660f40fb [ 3207.235153] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 3207.236595] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3207.238025] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 18:16:07 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:16:07 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb809792f8ddf90800617400020801000470000000f801", 0x17, 0xffffffffff800001}, {0x0, 0x0, 0x1000a00}], 0x140088, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x28, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) 18:16:07 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3207.269531] FAT-fs (loop5): invalid media value (0x00) [ 3207.270729] FAT-fs (loop5): Can't find a valid FAT filesystem 18:16:07 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 6) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3207.345276] 9pnet: Insufficient options for proto=fd [ 3207.356168] FAT-fs (loop4): bogus number of reserved sectors [ 3207.357819] FAT-fs (loop4): Can't find a valid FAT filesystem 18:16:07 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x3000000, &(0x7f0000000140)=@un=@abs, 0x80) [ 3207.405493] 9pnet: Insufficient options for proto=fd [ 3207.558303] FAULT_INJECTION: forcing a failure. [ 3207.558303] name failslab, interval 1, probability 0, space 0, times 0 [ 3207.561143] CPU: 1 PID: 20899 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3207.562429] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3207.563979] Call Trace: [ 3207.564473] dump_stack+0x107/0x167 [ 3207.565151] should_fail.cold+0x5/0xa [ 3207.565876] ? security_inode_alloc+0x34/0x160 [ 3207.566730] should_failslab+0x5/0x20 [ 3207.567432] kmem_cache_alloc+0x5b/0x310 [ 3207.568179] security_inode_alloc+0x34/0x160 [ 3207.568966] inode_init_always+0xa4e/0xd10 [ 3207.569709] ? shmem_destroy_inode+0x70/0x70 [ 3207.570505] alloc_inode+0x84/0x240 [ 3207.571131] new_inode+0x23/0x250 [ 3207.571763] shmem_get_inode+0x15e/0xbc0 [ 3207.572516] __shmem_file_setup+0xb8/0x320 [ 3207.573270] ? _copy_from_user+0xfb/0x1b0 [ 3207.574019] __do_sys_memfd_create+0x275/0x450 [ 3207.574835] ? memfd_file_seals_ptr+0x170/0x170 [ 3207.575671] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3207.576618] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3207.577524] do_syscall_64+0x33/0x40 [ 3207.578195] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3207.579109] RIP: 0033:0x7f5b6609ab19 [ 3207.579774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3207.583051] RSP: 002b:00007f5b6360ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3207.584444] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f5b6609ab19 [ 3207.585744] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f5b660f40fb [ 3207.587043] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 3207.588373] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3207.589704] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 3207.670562] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3207.698207] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:16:20 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:16:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:16:20 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:16:20 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x4000000, &(0x7f0000000140)=@un=@abs, 0x80) 18:16:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:16:20 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be", 0x9}, {0x0}, {0x0}], 0x3}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:16:20 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c90204fddd32e66617400020801000070000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r1, 0x400448dd, &(0x7f0000000380)={0x0, 0x0, "b680db"}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYBLOB='@\x00\x00\x00\x00\x00\x00\x00./file0\x00']) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) openat(r0, &(0x7f0000000240)='./file0\x00', 0x400480, 0x10) fallocate(r2, 0x0, 0x0, 0x8800000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) 18:16:20 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 7) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3220.413478] FAT-fs (loop4): bogus number of reserved sectors [ 3220.414442] FAT-fs (loop4): Can't find a valid FAT filesystem [ 3220.439445] FAULT_INJECTION: forcing a failure. [ 3220.439445] name failslab, interval 1, probability 0, space 0, times 0 [ 3220.441319] CPU: 0 PID: 20934 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3220.442384] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3220.443643] Call Trace: [ 3220.444055] dump_stack+0x107/0x167 [ 3220.444610] should_fail.cold+0x5/0xa [ 3220.445191] ? create_object.isra.0+0x3a/0xa20 [ 3220.445884] should_failslab+0x5/0x20 [ 3220.446457] kmem_cache_alloc+0x5b/0x310 [ 3220.447079] create_object.isra.0+0x3a/0xa20 [ 3220.447760] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3220.448531] kmem_cache_alloc+0x159/0x310 [ 3220.449025] security_inode_alloc+0x34/0x160 [ 3220.449540] inode_init_always+0xa4e/0xd10 [ 3220.450013] ? shmem_destroy_inode+0x70/0x70 [ 3220.450500] alloc_inode+0x84/0x240 [ 3220.450906] new_inode+0x23/0x250 [ 3220.451295] shmem_get_inode+0x15e/0xbc0 [ 3220.451761] __shmem_file_setup+0xb8/0x320 [ 3220.452234] ? _copy_from_user+0xfb/0x1b0 [ 3220.452696] __do_sys_memfd_create+0x275/0x450 [ 3220.453200] ? memfd_file_seals_ptr+0x170/0x170 [ 3220.453713] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3220.454319] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3220.454893] do_syscall_64+0x33/0x40 [ 3220.455305] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3220.455895] RIP: 0033:0x7f5b6609ab19 [ 3220.456323] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3220.459476] RSP: 002b:00007f5b6360ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3220.461390] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f5b6609ab19 [ 3220.463174] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f5b660f40fb [ 3220.464978] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 3220.466766] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3220.468544] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 3220.475988] FAT-fs (loop7): bogus number of FAT structure [ 3220.477261] FAT-fs (loop7): Can't find a valid FAT filesystem 18:16:20 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x5000000, &(0x7f0000000140)=@un=@abs, 0x80) 18:16:20 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000600)={0x3060180, 0x0, 0x0, 0x0, {0xe}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x200400, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fsetxattr$security_evm(r1, &(0x7f0000000080), &(0x7f00000000c0)=ANY=[@ANYBLOB="0600a10000000000000000220000000000"], 0x11, 0x0) execveat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000340), &(0x7f0000000800)=[&(0x7f0000000040)='\x00', &(0x7f0000000400)='\x00', &(0x7f0000000480)='\x00', 0x0, &(0x7f0000000540)='%.{\x00', &(0x7f00000005c0)='\t'], 0x900) [ 3220.516928] FAT-fs (loop5): invalid media value (0x00) [ 3220.518102] FAT-fs (loop5): Can't find a valid FAT filesystem 18:16:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) [ 3220.660020] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:16:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) [ 3220.783402] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3220.863784] FAT-fs (loop5): invalid media value (0x00) [ 3220.865075] FAT-fs (loop5): Can't find a valid FAT filesystem [ 3220.961612] FAT-fs (loop4): invalid media value (0x00) [ 3220.963267] FAT-fs (loop4): Can't find a valid FAT filesystem [ 3221.242405] FAT-fs (loop7): Unrecognized mount option "./file0" or missing value [ 3222.506682] Bluetooth: hci0: command 0x0c1a tx timeout [ 3224.554671] Bluetooth: hci0: command 0x0c1a tx timeout 18:16:34 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 8) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:16:34 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:16:34 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x6000000, &(0x7f0000000140)=@un=@abs, 0x80) 18:16:34 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd75ca72ed7f46500000000000000040065", 0x1d, 0x1600}], 0x8010, &(0x7f0000000280)=ANY=[]) setxattr$security_selinux(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340), &(0x7f0000000380)='system_u:object_r:autofs_device_t:s0\x00', 0x25, 0x1) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) ftruncate(r1, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x10a) write(r3, &(0x7f0000000240)="01", 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x10) fcntl$dupfd(r0, 0x0, r1) sendfile(r1, r2, 0x0, 0x20d315) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x40202, 0x0) fsetxattr$security_evm(r4, &(0x7f0000000180), &(0x7f00000001c0)=@md5={0x1, "14a8e82f6acb5c1fdec6fd2a1d7050a2"}, 0x11, 0x6) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000002c0)) 18:16:34 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:16:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000", 0x15}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:16:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:16:34 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') chdir(&(0x7f00000000c0)='./file1\x00') openat(r0, &(0x7f00000001c0)='./file1\x00', 0x200000, 0xbc) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x305142, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) [ 3234.460542] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 3234.480826] FAT-fs (loop4): invalid media value (0x00) [ 3234.482112] FAT-fs (loop4): Can't find a valid FAT filesystem [ 3234.501060] audit: type=1400 audit(1701713794.617:55): avc: denied { search } for pid=20974 comm="syz-executor.0" name="/" dev="loop0" ino=2 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:autofs_device_t:s0 tclass=dir permissive=1 [ 3234.516711] audit: type=1400 audit(1701713794.617:56): avc: denied { write } for pid=20974 comm="syz-executor.0" name="/" dev="loop0" ino=2 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:autofs_device_t:s0 tclass=dir permissive=1 [ 3234.526252] FAULT_INJECTION: forcing a failure. [ 3234.526252] name failslab, interval 1, probability 0, space 0, times 0 [ 3234.529023] CPU: 0 PID: 20998 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3234.530444] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3234.532156] Call Trace: [ 3234.532729] dump_stack+0x107/0x167 [ 3234.533487] should_fail.cold+0x5/0xa [ 3234.534292] ? __d_alloc+0x2a/0x990 [ 3234.535077] should_failslab+0x5/0x20 [ 3234.535875] kmem_cache_alloc+0x5b/0x310 [ 3234.536742] ? trace_hardirqs_on+0x5b/0x180 [ 3234.537645] __d_alloc+0x2a/0x990 [ 3234.538369] d_alloc_pseudo+0x19/0x70 [ 3234.539173] alloc_file_pseudo+0xce/0x250 [ 3234.540035] ? alloc_file+0x5a0/0x5a0 [ 3234.540849] ? shmem_get_inode+0x55c/0xbc0 [ 3234.541733] __shmem_file_setup+0x144/0x320 [ 3234.542636] ? _copy_from_user+0xfb/0x1b0 [ 3234.543494] __do_sys_memfd_create+0x275/0x450 [ 3234.544461] ? memfd_file_seals_ptr+0x170/0x170 [ 3234.545555] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3234.546687] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3234.547777] do_syscall_64+0x33/0x40 [ 3234.548552] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3234.549615] RIP: 0033:0x7f5b6609ab19 [ 3234.550385] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3234.552098] audit: type=1400 audit(1701713794.618:57): avc: denied { add_name } for pid=20974 comm="syz-executor.0" name="file1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:autofs_device_t:s0 tclass=dir permissive=1 [ 3234.554176] RSP: 002b:00007f5b6360ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3234.554199] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f5b6609ab19 [ 3234.554210] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f5b660f40fb [ 3234.554220] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 3234.554231] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3234.554242] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 3234.571920] audit: type=1400 audit(1701713794.627:58): avc: denied { create } for pid=20974 comm="syz-executor.0" name="file1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:autofs_device_t:s0 tclass=file permissive=1 [ 3234.577932] audit: type=1400 audit(1701713794.631:59): avc: denied { read write open } for pid=20974 comm="syz-executor.0" path="/syzkaller-testdir762289315/syzkaller.H1PGYC/374/file0/file1" dev="loop0" ino=17 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:autofs_device_t:s0 tclass=file permissive=1 18:16:34 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x7000000, &(0x7f0000000140)=@un=@abs, 0x80) [ 3234.597996] FAT-fs (loop5): invalid media value (0x00) [ 3234.599359] FAT-fs (loop5): Can't find a valid FAT filesystem [ 3234.615121] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:16:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000", 0x15}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:16:34 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:16:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:16:34 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x8000000, &(0x7f0000000140)=@un=@abs, 0x80) [ 3234.889542] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:16:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast1, 0x1}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x880, 0x0) recvfrom$inet6(r1, &(0x7f0000002d00)=""/4096, 0x1000, 0x0, &(0x7f0000000200)={0xa, 0x4e24, 0x4, @mcast2}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000001700)=[{{&(0x7f0000000380)={0xa, 0x4e22, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x101}, 0x1c, &(0x7f0000000580)=[{&(0x7f00000003c0)="6f224a828cc86e26f3a08a013c73a4def0c7bc9ff3a9b9eb3c9513d4c6d63e8b0fa2cd976791", 0x26}, {&(0x7f0000000640)="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", 0x5f4}, {&(0x7f0000000480)="71925b45758eb1ab74253fa7b3a0c8c2cccecd90a01ea04ad0ca62c9ff", 0x1d}, {0x0}, {&(0x7f0000001e00)="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", 0xf00}], 0x5}}], 0x1, 0x2890) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x40000000000012c, 0x4000850) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000040000000000000000000000000000002e7589404d00f40c986c621b9744de330900a962aa85c81de7d764c2c04b529b1bf63af7100452a69a376aa4232df759bab0f94afbfc2c103564b157d17e82dea41ccd98ccc686f92f65221c7769a55d39e1aeb7051bfaba430500c16cf109a923f105d5cc5ef972d43a37dd329a9a03344b64"]) getsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000000)={@empty}, &(0x7f0000000040)=0x14) socket$inet6_udp(0xa, 0x2, 0x0) 18:16:35 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 9) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3235.009206] FAT-fs (loop5): invalid media value (0x00) [ 3235.010465] FAT-fs (loop5): Can't find a valid FAT filesystem 18:16:35 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3235.086197] FAT-fs (loop4): invalid media value (0x00) [ 3235.087887] FAT-fs (loop4): Can't find a valid FAT filesystem 18:16:35 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xe000000, &(0x7f0000000140)=@un=@abs, 0x80) 18:16:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000", 0x15}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) [ 3235.245188] FAULT_INJECTION: forcing a failure. [ 3235.245188] name failslab, interval 1, probability 0, space 0, times 0 [ 3235.248148] CPU: 0 PID: 21038 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3235.249653] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3235.251362] Call Trace: [ 3235.251906] dump_stack+0x107/0x167 [ 3235.252689] should_fail.cold+0x5/0xa [ 3235.253488] ? create_object.isra.0+0x3a/0xa20 [ 3235.254429] should_failslab+0x5/0x20 [ 3235.255210] kmem_cache_alloc+0x5b/0x310 [ 3235.256049] create_object.isra.0+0x3a/0xa20 [ 3235.256969] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3235.258007] kmem_cache_alloc+0x159/0x310 [ 3235.258864] __d_alloc+0x2a/0x990 [ 3235.259579] d_alloc_pseudo+0x19/0x70 [ 3235.260374] alloc_file_pseudo+0xce/0x250 [ 3235.261223] ? alloc_file+0x5a0/0x5a0 [ 3235.262012] ? shmem_get_inode+0x55c/0xbc0 [ 3235.262892] __shmem_file_setup+0x144/0x320 [ 3235.263778] ? _copy_from_user+0xfb/0x1b0 [ 3235.264645] __do_sys_memfd_create+0x275/0x450 [ 3235.265579] ? memfd_file_seals_ptr+0x170/0x170 [ 3235.266541] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3235.267609] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3235.268691] do_syscall_64+0x33/0x40 [ 3235.269451] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3235.270499] RIP: 0033:0x7f5b6609ab19 [ 3235.271265] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3235.275025] RSP: 002b:00007f5b6360ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3235.276575] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f5b6609ab19 [ 3235.278022] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f5b660f40fb [ 3235.279467] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 3235.280930] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3235.282379] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 18:16:35 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f00000000c0)={0x0, 0x4, [0x7ff, 0x4, 0x2, 0x5, 0x3, 0x7ea]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r4 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0), 0xc2403, 0x0) fsetxattr$security_ima(r4, &(0x7f0000000300), &(0x7f0000000340)=@v2={0x3, 0x0, 0x11, 0x3f, 0x67, "37cf668392a32f86572c1c609026cf97881cdef8deea0ec370d9a5390e1e910f5cdf499f997a6c7ec2e649ed1f88ce1eb8343dc7cda132ac15a1ae18a2a7954807f522c83baffb1dfcc6d144c2b71770d89b475030015f2f7fdc20766d03995edc67533773311d"}, 0x70, 0x2) r5 = openat$cgroup_ro(r1, &(0x7f00000001c0)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000240)={0xfffffffe, 0x10000, 0x9, 0x9, 0xffffffff}) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) [ 3235.360146] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3235.504055] FAT-fs (loop5): invalid media value (0x00) [ 3235.505300] FAT-fs (loop5): Can't find a valid FAT filesystem [ 3235.555377] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:16:49 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:16:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000", 0x15}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:16:49 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r1, 0x400448dd, &(0x7f0000000380)={0x0, 0x0, "b680db"}) lseek(r1, 0x81, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) 18:16:49 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:16:49 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 10) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:16:49 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x11000000, &(0x7f0000000140)=@un=@abs, 0x80) 18:16:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:16:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f00000002c0)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044025, &(0x7f0000000180)=ANY=[@ANYBLOB="0040deab825718a47f88b41407ad412a40acd4b106b1b5c4d9432a071d9062f058048e9e380a6c2b491def9e365c97d7dea3db561fe99f32f549f095edc47427ef57128950247abfba5e6400fea05a805d19cdddfc0f9258a8e9f6e41bafc6429c2a6cebf6c7"]) [ 3249.696768] FAT-fs (loop4): invalid media value (0x00) [ 3249.697963] FAT-fs (loop4): Can't find a valid FAT filesystem [ 3249.701027] FAT-fs (loop5): bogus number of FAT sectors [ 3249.702219] FAT-fs (loop5): Can't find a valid FAT filesystem [ 3249.722377] FAULT_INJECTION: forcing a failure. [ 3249.722377] name failslab, interval 1, probability 0, space 0, times 0 [ 3249.725022] CPU: 1 PID: 21079 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3249.726428] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3249.728108] Call Trace: [ 3249.728686] dump_stack+0x107/0x167 [ 3249.729442] should_fail.cold+0x5/0xa [ 3249.730237] ? __alloc_file+0x21/0x320 [ 3249.731055] should_failslab+0x5/0x20 [ 3249.731834] kmem_cache_alloc+0x5b/0x310 [ 3249.732680] __alloc_file+0x21/0x320 [ 3249.733448] alloc_empty_file+0x6d/0x170 [ 3249.734283] alloc_file+0x5e/0x5a0 [ 3249.735027] alloc_file_pseudo+0x16a/0x250 [ 3249.735888] ? alloc_file+0x5a0/0x5a0 [ 3249.736673] ? shmem_get_inode+0x55c/0xbc0 [ 3249.737533] __shmem_file_setup+0x144/0x320 [ 3249.738410] ? _copy_from_user+0xfb/0x1b0 [ 3249.739251] __do_sys_memfd_create+0x275/0x450 [ 3249.740176] ? memfd_file_seals_ptr+0x170/0x170 [ 3249.741180] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3249.742258] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3249.743428] do_syscall_64+0x33/0x40 [ 3249.744185] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3249.745230] RIP: 0033:0x7f5b6609ab19 [ 3249.745980] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3249.749717] RSP: 002b:00007f5b6360ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3249.751270] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f5b6609ab19 [ 3249.752731] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f5b660f40fb [ 3249.754169] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 3249.755618] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3249.757091] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 18:16:49 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x28000000, &(0x7f0000000140)=@un=@abs, 0x80) [ 3249.858344] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:16:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:16:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000", 0x15}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:16:50 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 11) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3250.122226] FAULT_INJECTION: forcing a failure. [ 3250.122226] name failslab, interval 1, probability 0, space 0, times 0 [ 3250.125195] CPU: 0 PID: 21101 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3250.126675] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3250.128352] Call Trace: [ 3250.128920] dump_stack+0x107/0x167 [ 3250.129664] should_fail.cold+0x5/0xa [ 3250.130443] ? create_object.isra.0+0x3a/0xa20 [ 3250.131369] should_failslab+0x5/0x20 [ 3250.132141] kmem_cache_alloc+0x5b/0x310 [ 3250.132977] create_object.isra.0+0x3a/0xa20 [ 3250.133872] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3250.134900] kmem_cache_alloc+0x159/0x310 [ 3250.135737] __alloc_file+0x21/0x320 [ 3250.136505] alloc_empty_file+0x6d/0x170 [ 3250.137331] alloc_file+0x5e/0x5a0 [ 3250.138063] alloc_file_pseudo+0x16a/0x250 [ 3250.138920] ? alloc_file+0x5a0/0x5a0 [ 3250.139692] ? shmem_get_inode+0x55c/0xbc0 [ 3250.140575] __shmem_file_setup+0x144/0x320 [ 3250.141447] ? _copy_from_user+0xfb/0x1b0 [ 3250.142297] __do_sys_memfd_create+0x275/0x450 [ 3250.143227] ? memfd_file_seals_ptr+0x170/0x170 [ 3250.144168] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3250.145237] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3250.146298] do_syscall_64+0x33/0x40 [ 3250.147061] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3250.148108] RIP: 0033:0x7f5b6609ab19 [ 3250.148868] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3250.152609] RSP: 002b:00007f5b6360ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3250.154159] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f5b6609ab19 [ 3250.155602] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f5b660f40fb [ 3250.157064] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 3250.158508] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3250.159935] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 3250.167092] FAT-fs (loop5): bogus number of FAT sectors [ 3250.167129] FAT-fs (loop4): invalid media value (0x00) [ 3250.168256] FAT-fs (loop5): Can't find a valid FAT filesystem [ 3250.169360] FAT-fs (loop4): Can't find a valid FAT filesystem [ 3251.818674] Bluetooth: hci0: command 0x0c1a tx timeout 18:17:04 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:17:04 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x36000000, &(0x7f0000000140)=@un=@abs, 0x80) 18:17:04 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) openat(r0, &(0x7f00000000c0)='./file1/file0\x00', 0x124000, 0x19) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) 18:17:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000", 0x15}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:17:04 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:17:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:17:04 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:17:04 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 12) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3264.375131] FAT-fs (loop4): invalid media value (0x00) [ 3264.376377] FAT-fs (loop4): Can't find a valid FAT filesystem [ 3264.382099] FAULT_INJECTION: forcing a failure. [ 3264.382099] name failslab, interval 1, probability 0, space 0, times 0 [ 3264.384970] CPU: 1 PID: 21131 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3264.386411] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3264.388104] Call Trace: [ 3264.388656] dump_stack+0x107/0x167 [ 3264.389436] should_fail.cold+0x5/0xa [ 3264.390252] ? security_file_alloc+0x34/0x170 [ 3264.391204] should_failslab+0x5/0x20 [ 3264.391998] kmem_cache_alloc+0x5b/0x310 [ 3264.392858] security_file_alloc+0x34/0x170 [ 3264.393756] __alloc_file+0xb6/0x320 [ 3264.394525] alloc_empty_file+0x6d/0x170 [ 3264.395381] alloc_file+0x5e/0x5a0 [ 3264.396111] alloc_file_pseudo+0x16a/0x250 [ 3264.396986] ? alloc_file+0x5a0/0x5a0 [ 3264.397792] ? shmem_get_inode+0x55c/0xbc0 [ 3264.398685] __shmem_file_setup+0x144/0x320 [ 3264.399572] ? _copy_from_user+0xfb/0x1b0 [ 3264.400423] __do_sys_memfd_create+0x275/0x450 [ 3264.401365] ? memfd_file_seals_ptr+0x170/0x170 [ 3264.402322] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3264.403436] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3264.404491] do_syscall_64+0x33/0x40 [ 3264.405280] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3264.406324] RIP: 0033:0x7f5b6609ab19 [ 3264.407081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3264.410853] RSP: 002b:00007f5b6360ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3264.412426] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f5b6609ab19 [ 3264.413919] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f5b660f40fb [ 3264.415381] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 3264.416831] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3264.418286] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 18:17:04 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x40000000, &(0x7f0000000140)=@un=@abs, 0x80) [ 3264.470822] FAT-fs (loop5): bogus number of FAT sectors [ 3264.472000] FAT-fs (loop5): Can't find a valid FAT filesystem 18:17:04 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 13) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3264.613169] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:17:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) [ 3264.693206] FAULT_INJECTION: forcing a failure. [ 3264.693206] name failslab, interval 1, probability 0, space 0, times 0 [ 3264.696380] CPU: 0 PID: 21157 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3264.697945] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3264.699756] Call Trace: [ 3264.700337] dump_stack+0x107/0x167 [ 3264.701158] should_fail.cold+0x5/0xa [ 3264.701988] ? create_object.isra.0+0x3a/0xa20 [ 3264.702891] should_failslab+0x5/0x20 [ 3264.703643] kmem_cache_alloc+0x5b/0x310 [ 3264.704458] create_object.isra.0+0x3a/0xa20 [ 3264.705349] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3264.706357] kmem_cache_alloc+0x159/0x310 [ 3264.707182] security_file_alloc+0x34/0x170 [ 3264.708041] __alloc_file+0xb6/0x320 [ 3264.708799] alloc_empty_file+0x6d/0x170 [ 3264.709234] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3264.709615] alloc_file+0x5e/0x5a0 [ 3264.709639] alloc_file_pseudo+0x16a/0x250 [ 3264.709659] ? alloc_file+0x5a0/0x5a0 [ 3264.709681] ? shmem_get_inode+0x55c/0xbc0 [ 3264.709707] __shmem_file_setup+0x144/0x320 [ 3264.709724] ? _copy_from_user+0xfb/0x1b0 [ 3264.709744] __do_sys_memfd_create+0x275/0x450 [ 3264.709763] ? memfd_file_seals_ptr+0x170/0x170 [ 3264.709786] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3264.709803] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3264.709825] do_syscall_64+0x33/0x40 [ 3264.709845] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3264.709857] RIP: 0033:0x7f5b6609ab19 [ 3264.709884] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3264.726653] RSP: 002b:00007f5b6360ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3264.728325] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f5b6609ab19 [ 3264.729915] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f5b660f40fb [ 3264.731482] RBP: 0000000000000004 R08: 0000000000002100 R09: ffffffffffffffff [ 3264.733048] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3264.734617] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 18:17:04 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:17:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:17:04 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x60000000, &(0x7f0000000140)=@un=@abs, 0x80) [ 3264.827262] EXT4-fs (loop0): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:17:04 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3264.869883] FAT-fs (loop4): bogus number of FAT sectors [ 3264.871064] FAT-fs (loop4): Can't find a valid FAT filesystem 18:17:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001800210c00000000000000e301000000080073e9c4f597f1079912000a00000000000000fcbe47bc4dbe869eb80ee570aba55aa66cbfffc7e91fa547e1a23161cce686f4659b0c8ec8c530397b525f35e2920824ae61504fda2b271b928cbc6807a1c79cd9441bfe99d853ed0e9139ce831c560b090c5c0f4dc054da671383806f9c8faba165d260d1f53597d672d8df105b01af000cf4805d0c65a08a2f8236ab4aebbe3d002631d0af6ab7b6695dbc558a7fd83376f92a109a9362a6baf88a2194e8613226b11448ffa19ed4ce70029f"], 0x28}}, 0x0) 18:17:05 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 14) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:17:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) [ 3265.212251] FAULT_INJECTION: forcing a failure. [ 3265.212251] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3265.215283] CPU: 0 PID: 21187 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3265.216671] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3265.218315] Call Trace: [ 3265.218842] dump_stack+0x107/0x167 [ 3265.219572] should_fail.cold+0x5/0xa [ 3265.220453] __alloc_pages_nodemask+0x182/0x600 [ 3265.221395] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 3265.222585] ? lock_downgrade+0x6d0/0x6d0 [ 3265.223409] ? lock_acquire+0x197/0x470 [ 3265.224213] alloc_pages_vma+0xbb/0x410 [ 3265.225017] shmem_alloc_page+0x10f/0x1e0 [ 3265.225840] ? shmem_init_inode+0x20/0x20 [ 3265.226685] ? percpu_counter_add_batch+0x8b/0x140 [ 3265.227660] ? __vm_enough_memory+0x184/0x360 [ 3265.228553] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 3265.229635] ? shmem_unuse_inode+0xf60/0xf60 [ 3265.230507] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 3265.231526] ? iov_iter_fault_in_readable+0x9a/0x410 [ 3265.232539] shmem_write_begin+0xf7/0x1d0 [ 3265.233374] generic_perform_write+0x20a/0x4f0 [ 3265.234291] ? page_cache_prev_miss+0x310/0x310 [ 3265.235214] ? evict_inodes+0x420/0x420 [ 3265.236017] ? generic_write_checks+0x2ad/0x390 [ 3265.236965] __generic_file_write_iter+0x39d/0x5d0 [ 3265.237944] generic_file_write_iter+0xdb/0x230 [ 3265.238864] ? iov_iter_init+0x3c/0x130 [ 3265.239656] new_sync_write+0x42c/0x660 [ 3265.240448] ? new_sync_read+0x6f0/0x6f0 [ 3265.241263] ? __x64_sys_pwrite64+0x201/0x260 [ 3265.242156] ? lock_release+0x680/0x680 [ 3265.242948] ? selinux_file_permission+0x92/0x520 [ 3265.243935] vfs_write+0x747/0xa70 [ 3265.244660] __x64_sys_pwrite64+0x201/0x260 [ 3265.245520] ? ksys_pwrite64+0x1b0/0x1b0 [ 3265.246335] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3265.247184] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3265.247380] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3265.250192] do_syscall_64+0x33/0x40 [ 3265.251037] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3265.252794] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3265.253811] RIP: 0033:0x7f5b6604dab7 [ 3265.254554] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3265.258201] RSP: 002b:00007f5b6360ff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3265.259709] RAX: ffffffffffffffda RBX: 00007f5b660e4970 RCX: 00007f5b6604dab7 [ 3265.261132] RDX: 000000000000005a RSI: 0000000020000040 RDI: 0000000000000008 [ 3265.262536] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 3265.263942] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000008 [ 3265.265351] R13: 0000000000000008 R14: 0000000020000440 R15: 0000000000000000 [ 3265.312571] FAT-fs (loop4): bogus number of FAT sectors [ 3265.313905] FAT-fs (loop4): Can't find a valid FAT filesystem 18:17:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:17:19 executing program 0: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x101, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_80211_inject_frame(&(0x7f0000000200)=@device_b, &(0x7f0000000240)=@mgmt_frame=@probe_response={@wo_ht={{0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1}, {}, @device_b, @device_a, @from_mac, {0x2, 0x97}}, 0x0, @default, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @void, @void, @void, @val={0x6, 0x2, 0x4}, @val={0x2d, 0x1a, {0x80, 0x0, 0x3, 0x0, {0x1, 0x1ff7, 0x0, 0x15e, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x6, 0x6, 0xff}}, @void, @val={0x71, 0x7, {0xffffffffffffffff, 0x1, 0x0, 0x1, 0x1, 0x1c, 0x20}}, [{0xdd, 0xa, "88d1c7a4b4a89fd7da61"}, {0xdd, 0x73, "bfb4cd1c3ebfece64429c7b8a0d6ba6f3a15ccb1029d13450e269f79de3a48a3bc3a084dd540ac0c4b5fd11bfe7954ad914da85148d7ac3091617390d457ae64e7094b5d98470fa278b10500e0f48a6b1013a7be6d6e0512ad16edd6735ce3d0640c19d10af5d6889ca3adf085be78abe0a193"}, {0xdd, 0x3d, "ada05503c5a1f78bc2ff9f1129408c3212fcfca9709221573d3908e7814a91dc02a0c52f4e30e7fba70a87797098f4b64d89b2c647cdc883d0c8b1091b"}, {0xdd, 0x3d, "1f1f9a8a590824e9f36249aaf163fe7c79fa1bb23f3e287c63214ad0dd72ae8db490cd088310ecd38492d583c5389e03d833cf3fad40c1ee38c0d5261f"}]}, 0x154) 18:17:19 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xe8030000, &(0x7f0000000140)=@un=@abs, 0x80) 18:17:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:17:19 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f00000001c0)='./file1\x00', 0x100) ftruncate(r1, 0x4) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000100)=0x0) r3 = creat(0x0, 0x0) sendmmsg$inet6(r3, 0x0, 0x0, 0x40) openat(r3, &(0x7f00000000c0)='./file1\x00', 0x80, 0xa) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000001e00)={{}, r2, 0x2, @inherit={0x68, &(0x7f0000001640)=ANY=[@ANYBLOB="00000000000000000400000000000000070000000000000009000000000000000000000000000000000000000000000007000000000000000000000000000800000000000000000000001400000006000000000000000300000004000000eeff0000010000000000b9ce8477338dd226f33ebe404960a5c8110a8e5d357bf1557a4fbb72fdebe052631da701495ea76de1a41e73ed9f5a5071ebf50ec4e74b5c7e0cce69aeb65343c2d5b9ede9d191d9fe01b689c25b07febba56bd8f9f49c54356a6f42bc6d044ec945f9a9a3e4afce2b5cd3a4c6d1f2a3a34152c9a6e37d15"]}, @subvolid=0xe1}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000440)={{}, r2, 0x10, @inherit={0x68, &(0x7f0000001540)=ANY=[@ANYBLOB="000000000000000004000000000000b3009e3b000000000000ff7f7600000000002200000000000000723c00000000000002000000000000000000ae3b7c9500000104000000000000010001000000000020000000000000000600000000000000ff7f00000000000044bfb0f0c6374b1c26bfdea86f63f80c41245a3db39a6e9d0a667f7208a0dfa5758d9570298afad8cee16322afcc6e272fe9fac0d4c513cd6f26db138427d0f6f2369267f34b9a22b4d4a0c6b6241d27b2586e43411afcb54c0abdfca5a2fe58d01b0f481d467da1f72148b0228dfd84f9ff3a2f54ebd725"]}, @subvolid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000002c0)={"fe62c201be0ee8b4cf00", 0x0, r2, {0x4, 0x3ff}, {0x5, 0x6}, 0x10000, [0x4000005, 0x0, 0x3be2, 0x4, 0x4, 0x1000, 0x1, 0x1, 0x1, 0x2, 0x35a, 0x6, 0x9, 0x2d58, 0x0, 0x94b5]}) fallocate(r0, 0x0, 0x0, 0x8800000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) 18:17:19 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:17:19 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:17:19 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 15) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3279.513249] FAT-fs (loop4): bogus number of FAT sectors [ 3279.514502] FAT-fs (loop4): Can't find a valid FAT filesystem [ 3279.533205] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 3279.550530] FAULT_INJECTION: forcing a failure. [ 3279.550530] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3279.553375] CPU: 1 PID: 21216 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3279.554805] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3279.556529] Call Trace: [ 3279.557103] dump_stack+0x107/0x167 [ 3279.557877] should_fail.cold+0x5/0xa [ 3279.558697] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 3279.559841] ? shmem_write_begin+0xf7/0x1d0 [ 3279.560729] ? shmem_write_begin+0x100/0x1d0 [ 3279.561663] generic_perform_write+0x279/0x4f0 [ 3279.562611] ? page_cache_prev_miss+0x310/0x310 [ 3279.563562] ? evict_inodes+0x420/0x420 [ 3279.564393] ? generic_write_checks+0x2ad/0x390 [ 3279.565354] __generic_file_write_iter+0x39d/0x5d0 [ 3279.566357] generic_file_write_iter+0xdb/0x230 [ 3279.567303] ? iov_iter_init+0x3c/0x130 [ 3279.568129] new_sync_write+0x42c/0x660 [ 3279.568946] ? new_sync_read+0x6f0/0x6f0 [ 3279.569782] ? __x64_sys_pwrite64+0x201/0x260 [ 3279.570699] ? lock_release+0x680/0x680 [ 3279.571518] ? selinux_file_permission+0x92/0x520 [ 3279.572519] vfs_write+0x747/0xa70 [ 3279.573268] __x64_sys_pwrite64+0x201/0x260 [ 3279.574171] ? ksys_pwrite64+0x1b0/0x1b0 [ 3279.575025] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3279.576239] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3279.577319] do_syscall_64+0x33/0x40 [ 3279.578077] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3279.579123] RIP: 0033:0x7f5b6604dab7 [ 3279.579882] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3279.583630] RSP: 002b:00007f5b6360ff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3279.585196] RAX: ffffffffffffffda RBX: 00007f5b660e4970 RCX: 00007f5b6604dab7 [ 3279.586645] RDX: 000000000000005a RSI: 0000000020000040 RDI: 0000000000000008 [ 3279.588095] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 3279.589559] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000008 [ 3279.591009] R13: 0000000000000008 R14: 0000000020000440 R15: 0000000000000000 18:17:19 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xf4010000, &(0x7f0000000140)=@un=@abs, 0x80) 18:17:19 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 16) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:17:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:17:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) [ 3279.787433] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3279.865029] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3279.887453] FAULT_INJECTION: forcing a failure. [ 3279.887453] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3279.890084] CPU: 1 PID: 21236 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3279.891469] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3279.893179] Call Trace: [ 3279.893727] dump_stack+0x107/0x167 [ 3279.894502] should_fail.cold+0x5/0xa [ 3279.895318] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 3279.896425] ? shmem_write_begin+0xf7/0x1d0 [ 3279.897297] ? shmem_write_begin+0x100/0x1d0 [ 3279.898203] generic_perform_write+0x279/0x4f0 [ 3279.899163] ? page_cache_prev_miss+0x310/0x310 [ 3279.900105] ? evict_inodes+0x420/0x420 [ 3279.900933] ? generic_write_checks+0x2ad/0x390 [ 3279.901890] __generic_file_write_iter+0x39d/0x5d0 [ 3279.902894] generic_file_write_iter+0xdb/0x230 [ 3279.903835] ? iov_iter_init+0x3c/0x130 [ 3279.904655] new_sync_write+0x42c/0x660 [ 3279.905476] ? new_sync_read+0x6f0/0x6f0 [ 3279.906318] ? __x64_sys_pwrite64+0x201/0x260 [ 3279.907238] ? lock_release+0x680/0x680 [ 3279.908061] ? selinux_file_permission+0x92/0x520 [ 3279.909069] vfs_write+0x747/0xa70 [ 3279.909800] __x64_sys_pwrite64+0x201/0x260 [ 3279.910675] ? ksys_pwrite64+0x1b0/0x1b0 [ 3279.911495] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3279.912569] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3279.913790] do_syscall_64+0x33/0x40 [ 3279.914629] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3279.915799] RIP: 0033:0x7f5b6604dab7 [ 3279.916556] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3279.920353] RSP: 002b:00007f5b6360ff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3279.922177] RAX: ffffffffffffffda RBX: 00007f5b660e4970 RCX: 00007f5b6604dab7 [ 3279.923647] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000008 [ 3279.925115] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 3279.926591] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000008 [ 3279.928168] R13: 0000000000000008 R14: 0000000020000470 R15: 0000000000000002 18:17:20 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x14, 0x0, 0x8800000) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0xff) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x0, 0x1f, 0x3}) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r3, 0x400448dd, &(0x7f0000000380)={0x0, 0x0, "b680db"}) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file2\x00', 0x80) fallocate(r3, 0x6, 0x3, 0x1) 18:17:20 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:17:20 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xf5ffffff, &(0x7f0000000140)=@un=@abs, 0x80) 18:17:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:17:20 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:17:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) [ 3280.136484] FAT-fs (loop0): bogus number of FAT sectors [ 3280.137725] FAT-fs (loop0): Can't find a valid FAT filesystem [ 3280.304091] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3280.366992] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3282.218664] Bluetooth: hci0: command 0x0c1a tx timeout [ 3284.266680] Bluetooth: hci0: command 0x0c1a tx timeout 18:17:35 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xfc000000, &(0x7f0000000140)=@un=@abs, 0x80) 18:17:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:17:35 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:17:35 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0}) syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000480)='./file0\x00', 0x1, 0x2, &(0x7f0000001800)=[{0x0}, {0x0}], 0x4, &(0x7f00000018c0)={[{@fat=@nocase}, {@nodots}, {@nodots}, {@fat=@gid}], [{@fowner_gt={'fowner>', 0xee01}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'fd/4\x00'}}]}) readv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000340)=""/209, 0xd1}, {0x0}], 0x3) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000140)={0x5, &(0x7f0000000040)=[{0x3ff, 0x6, 0x5}, {0x6, 0xf7, 0x1, 0x5}, {0x1, 0x20, 0x40, 0x1}, {0x7f, 0xf9, 0x4, 0x913}, {0x99, 0x6, 0x1, 0x8}]}) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) unshare(0x48020200) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000001c0)={0x0, 0x0, 0x4}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000000)={r1, 0x9, 0x3}) 18:17:35 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:17:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:17:35 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x101002, 0x30) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) 18:17:35 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 17) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3295.325462] FAULT_INJECTION: forcing a failure. [ 3295.325462] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3295.328524] CPU: 0 PID: 21287 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3295.330028] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3295.331683] Call Trace: [ 3295.332216] dump_stack+0x107/0x167 [ 3295.332951] should_fail.cold+0x5/0xa [ 3295.333731] __alloc_pages_nodemask+0x182/0x600 [ 3295.334664] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 3295.335874] ? lock_downgrade+0x6d0/0x6d0 [ 3295.336707] ? lock_acquire+0x197/0x470 [ 3295.337552] alloc_pages_vma+0xbb/0x410 [ 3295.338365] shmem_alloc_page+0x10f/0x1e0 [ 3295.339201] ? shmem_init_inode+0x20/0x20 [ 3295.340076] ? percpu_counter_add_batch+0x8b/0x140 [ 3295.341087] ? __vm_enough_memory+0x184/0x360 [ 3295.342012] shmem_getpage_gfp.constprop.0+0x512/0x1920 [ 3295.343126] ? shmem_unuse_inode+0xf60/0xf60 [ 3295.344022] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 3295.345083] ? iov_iter_fault_in_readable+0x9a/0x410 [ 3295.346110] shmem_write_begin+0xf7/0x1d0 [ 3295.346952] generic_perform_write+0x20a/0x4f0 [ 3295.347880] ? page_cache_prev_miss+0x310/0x310 [ 3295.348812] ? evict_inodes+0x420/0x420 [ 3295.349629] ? generic_write_checks+0x2ad/0x390 [ 3295.350569] __generic_file_write_iter+0x39d/0x5d0 [ 3295.351558] generic_file_write_iter+0xdb/0x230 [ 3295.352487] ? iov_iter_init+0x3c/0x130 [ 3295.353309] new_sync_write+0x42c/0x660 [ 3295.354112] ? new_sync_read+0x6f0/0x6f0 [ 3295.354928] ? __x64_sys_pwrite64+0x201/0x260 [ 3295.355828] ? lock_release+0x680/0x680 [ 3295.356623] ? selinux_file_permission+0x92/0x520 [ 3295.357634] vfs_write+0x747/0xa70 [ 3295.358357] __x64_sys_pwrite64+0x201/0x260 [ 3295.359222] ? ksys_pwrite64+0x1b0/0x1b0 [ 3295.360040] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3295.361109] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3295.362147] do_syscall_64+0x33/0x40 [ 3295.362901] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3295.363929] RIP: 0033:0x7f5b6604dab7 [ 3295.364679] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3295.368389] RSP: 002b:00007f5b6360ff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3295.369940] RAX: ffffffffffffffda RBX: 00007f5b660e4970 RCX: 00007f5b6604dab7 [ 3295.371377] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000008 [ 3295.372816] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 3295.374271] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000008 [ 3295.375703] R13: 0000000000000008 R14: 0000000020000488 R15: 0000000000000003 18:17:35 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xfe800000, &(0x7f0000000140)=@un=@abs, 0x80) 18:17:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:17:35 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 18) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:17:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) [ 3295.562122] FAT-fs (loop0): Unrecognized mount option "fowner>00000000000000060929" or missing value [ 3295.605474] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3295.611379] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:17:35 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3295.723679] FAULT_INJECTION: forcing a failure. [ 3295.723679] name failslab, interval 1, probability 0, space 0, times 0 [ 3295.726332] CPU: 0 PID: 21319 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3295.727723] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3295.729399] Call Trace: [ 3295.729936] dump_stack+0x107/0x167 [ 3295.730678] should_fail.cold+0x5/0xa [ 3295.731450] ? xas_alloc+0x336/0x440 [ 3295.732206] should_failslab+0x5/0x20 [ 3295.733017] kmem_cache_alloc+0x5b/0x310 [ 3295.733840] ? trace_hardirqs_on+0x5b/0x180 [ 3295.734713] xas_alloc+0x336/0x440 [ 3295.735437] xas_create+0x60f/0x10d0 [ 3295.736211] xas_create_range+0x189/0x620 [ 3295.737076] shmem_add_to_page_cache+0x760/0x1130 [ 3295.738058] ? shmem_getattr+0x180/0x180 [ 3295.738902] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 3295.739993] ? shmem_unuse_inode+0xf60/0xf60 [ 3295.740882] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 3295.741942] ? iov_iter_fault_in_readable+0x9a/0x410 [ 3295.742989] shmem_write_begin+0xf7/0x1d0 [ 3295.743838] generic_perform_write+0x20a/0x4f0 [ 3295.744776] ? page_cache_prev_miss+0x310/0x310 [ 3295.745732] ? evict_inodes+0x420/0x420 [ 3295.746541] ? generic_write_checks+0x2ad/0x390 [ 3295.747495] __generic_file_write_iter+0x39d/0x5d0 [ 3295.748494] generic_file_write_iter+0xdb/0x230 [ 3295.749450] ? iov_iter_init+0x3c/0x130 [ 3295.750264] new_sync_write+0x42c/0x660 [ 3295.751094] ? new_sync_read+0x6f0/0x6f0 [ 3295.751914] ? __x64_sys_pwrite64+0x201/0x260 [ 3295.752818] ? lock_release+0x680/0x680 [ 3295.753644] ? selinux_file_permission+0x92/0x520 [ 3295.754647] vfs_write+0x747/0xa70 [ 3295.755383] __x64_sys_pwrite64+0x201/0x260 [ 3295.756268] ? ksys_pwrite64+0x1b0/0x1b0 [ 3295.757111] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3295.758192] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3295.759258] do_syscall_64+0x33/0x40 [ 3295.760017] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3295.761040] RIP: 0033:0x7f5b6604dab7 [ 3295.761800] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3295.765607] RSP: 002b:00007f5b6360ff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3295.767157] RAX: ffffffffffffffda RBX: 00007f5b660e4970 RCX: 00007f5b6604dab7 [ 3295.768612] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000008 [ 3295.770085] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 3295.771544] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000008 [ 3295.773021] R13: 0000000000000008 R14: 0000000020000488 R15: 0000000000000003 [ 3295.824460] FAT-fs (loop0): Unrecognized mount option "fowner>00000000000000060929" or missing value 18:17:49 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:17:49 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xfec00000, &(0x7f0000000140)=@un=@abs, 0x80) 18:17:49 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0}) syz_mount_image$msdos(&(0x7f0000000300), &(0x7f0000000480)='./file0\x00', 0x1, 0x2, &(0x7f0000001800)=[{0x0}, {0x0}], 0x4, &(0x7f00000018c0)={[{@fat=@nocase}, {@nodots}, {@nodots}, {@fat=@gid}], [{@fowner_gt={'fowner>', 0xee01}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'fd/4\x00'}}]}) readv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000340)=""/209, 0xd1}, {0x0}], 0x3) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000140)={0x5, &(0x7f0000000040)=[{0x3ff, 0x6, 0x5}, {0x6, 0xf7, 0x1, 0x5}, {0x1, 0x20, 0x40, 0x1}, {0x7f, 0xf9, 0x4, 0x913}, {0x99, 0x6, 0x1, 0x8}]}) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) unshare(0x48020200) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000001c0)={0x0, 0x0, 0x4}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000000)={r1, 0x9, 0x3}) 18:17:49 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:17:49 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 19) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:17:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:17:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:17:49 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x100, 0x4) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) [ 3309.633497] FAULT_INJECTION: forcing a failure. [ 3309.633497] name failslab, interval 1, probability 0, space 0, times 0 [ 3309.635774] CPU: 0 PID: 21339 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3309.637269] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3309.638993] Call Trace: [ 3309.639541] dump_stack+0x107/0x167 [ 3309.640299] should_fail.cold+0x5/0xa [ 3309.641138] ? create_object.isra.0+0x3a/0xa20 [ 3309.642188] should_failslab+0x5/0x20 [ 3309.643054] kmem_cache_alloc+0x5b/0x310 [ 3309.643991] create_object.isra.0+0x3a/0xa20 [ 3309.644996] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3309.646163] kmem_cache_alloc+0x159/0x310 [ 3309.647101] ? trace_hardirqs_on+0x5b/0x180 [ 3309.648085] xas_alloc+0x336/0x440 [ 3309.648899] xas_create+0x60f/0x10d0 [ 3309.649785] xas_create_range+0x189/0x620 [ 3309.650745] shmem_add_to_page_cache+0x760/0x1130 [ 3309.651858] ? shmem_getattr+0x180/0x180 [ 3309.652804] shmem_getpage_gfp.constprop.0+0x64a/0x1920 [ 3309.654034] ? shmem_unuse_inode+0xf60/0xf60 [ 3309.655034] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 3309.656205] ? iov_iter_fault_in_readable+0x9a/0x410 [ 3309.657388] shmem_write_begin+0xf7/0x1d0 [ 3309.658345] generic_perform_write+0x20a/0x4f0 [ 3309.659396] ? page_cache_prev_miss+0x310/0x310 [ 3309.660454] ? evict_inodes+0x420/0x420 [ 3309.661369] ? generic_write_checks+0x2ad/0x390 [ 3309.662438] __generic_file_write_iter+0x39d/0x5d0 [ 3309.663542] generic_file_write_iter+0xdb/0x230 [ 3309.664599] ? iov_iter_init+0x3c/0x130 [ 3309.665517] new_sync_write+0x42c/0x660 [ 3309.666427] ? new_sync_read+0x6f0/0x6f0 [ 3309.667345] ? __x64_sys_pwrite64+0x201/0x260 [ 3309.668372] ? lock_release+0x680/0x680 [ 3309.669276] ? selinux_file_permission+0x92/0x520 [ 3309.670409] vfs_write+0x747/0xa70 [ 3309.671232] __x64_sys_pwrite64+0x201/0x260 [ 3309.672225] ? ksys_pwrite64+0x1b0/0x1b0 [ 3309.673182] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3309.674383] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3309.675568] do_syscall_64+0x33/0x40 [ 3309.676424] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3309.677600] RIP: 0033:0x7f5b6604dab7 [ 3309.678451] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3309.682647] RSP: 002b:00007f5b6360ff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3309.684378] RAX: ffffffffffffffda RBX: 00007f5b660e4970 RCX: 00007f5b6604dab7 [ 3309.686022] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000008 [ 3309.687646] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 3309.689276] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000008 [ 3309.691073] R13: 0000000000000008 R14: 0000000020000488 R15: 0000000000000003 18:17:49 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xff000000, &(0x7f0000000140)=@un=@abs, 0x80) [ 3309.783191] FAT-fs (loop0): Unrecognized mount option "fowner>00000000000000060929" or missing value 18:17:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:17:50 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xfffffff5, &(0x7f0000000140)=@un=@abs, 0x80) 18:17:50 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 20) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3309.966581] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3309.972366] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:17:50 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:17:50 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0\x00'}) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r3, 0x400448dd, &(0x7f0000000380)={0x0, 0x0, "b680db", 0xfd}) copy_file_range(r2, 0x0, r3, &(0x7f00000000c0)=0x2000000929a, 0xac, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x8800000) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r5, 0x400448dd, &(0x7f0000000380)={0x0, 0x0, "b680db"}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/devices/software', 0x40000, 0x82) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000340)=0x7fffffff, 0xb7cc) r6 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r7 = dup(r5) bind$bt_hci(r7, &(0x7f00000003c0)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) ioctl$FITRIM(r6, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) fcntl$getflags(r0, 0x401) renameat2(r0, &(0x7f0000000240)='./file1\x00', r0, &(0x7f00000002c0)='./file1\x00', 0x2) 18:17:50 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:17:50 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3310.255173] FAULT_INJECTION: forcing a failure. [ 3310.255173] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3310.258414] CPU: 1 PID: 21383 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3310.259848] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3310.261564] Call Trace: [ 3310.262113] dump_stack+0x107/0x167 [ 3310.262870] should_fail.cold+0x5/0xa [ 3310.263662] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 3310.264755] ? shmem_write_begin+0xf7/0x1d0 [ 3310.265641] ? shmem_write_begin+0x100/0x1d0 [ 3310.266548] generic_perform_write+0x279/0x4f0 [ 3310.267490] ? page_cache_prev_miss+0x310/0x310 [ 3310.268434] ? evict_inodes+0x420/0x420 [ 3310.269253] ? generic_write_checks+0x2ad/0x390 [ 3310.270207] __generic_file_write_iter+0x39d/0x5d0 [ 3310.271207] generic_file_write_iter+0xdb/0x230 [ 3310.272147] ? iov_iter_init+0x3c/0x130 [ 3310.272959] new_sync_write+0x42c/0x660 [ 3310.273783] ? new_sync_read+0x6f0/0x6f0 [ 3310.274609] ? __x64_sys_pwrite64+0x201/0x260 [ 3310.275523] ? lock_release+0x680/0x680 [ 3310.276329] ? selinux_file_permission+0x92/0x520 [ 3310.277331] vfs_write+0x747/0xa70 [ 3310.278059] __x64_sys_pwrite64+0x201/0x260 [ 3310.278937] ? ksys_pwrite64+0x1b0/0x1b0 [ 3310.279765] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3310.280824] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3310.281880] do_syscall_64+0x33/0x40 [ 3310.282638] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3310.283675] RIP: 0033:0x7f5b6604dab7 [ 3310.284429] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 3310.288173] RSP: 002b:00007f5b6360ff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 3310.289725] RAX: ffffffffffffffda RBX: 00007f5b660e4970 RCX: 00007f5b6604dab7 [ 3310.291173] RDX: 000000000000001d RSI: 0000000020011600 RDI: 0000000000000008 [ 3310.292618] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffffffffffffff [ 3310.294086] R10: 0000000000002100 R11: 0000000000000293 R12: 0000000000000008 [ 3310.295529] R13: 0000000000000008 R14: 0000000020000488 R15: 0000000000000003 18:17:50 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x4000000000000, &(0x7f0000000140)=@un=@abs, 0x80) 18:17:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:17:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:17:50 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x8000000000000, &(0x7f0000000140)=@un=@abs, 0x80) 18:17:50 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3310.530187] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3310.589206] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:17:50 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3310.788530] EXT4-fs (loop0): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3310.925612] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3310.965972] FAT-fs (loop7): Unrecognized mount option "š’" or missing value [ 3312.170898] Bluetooth: hci0: command 0x0c1a tx timeout [ 3314.218657] Bluetooth: hci0: command 0x0c1a tx timeout [ 3316.412065] Bluetooth: hci0: command 0x0c1a tx timeout [ 3318.442668] Bluetooth: hci0: command 0x0c1a tx timeout 18:18:05 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 21) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:18:05 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:18:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:18:05 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) openat(r0, &(0x7f00000000c0)='./file1\x00', 0x20001, 0x10d) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) 18:18:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:18:05 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x19, 0x3, 0xfd, 0x0, 0x0, 0x8, 0x20000, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x8001, 0x731d, 0x3, 0x3, 0x1f, 0x3, 0x3ff, 0x0, 0x1, 0x0, 0x7fff}, r1, 0x1, r0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r2 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) fallocate(r2, 0x0, 0x0, 0x400004) 18:18:05 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:18:05 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x40030000000000, &(0x7f0000000140)=@un=@abs, 0x80) [ 3325.439486] FAULT_INJECTION: forcing a failure. [ 3325.439486] name failslab, interval 1, probability 0, space 0, times 0 [ 3325.442110] CPU: 0 PID: 21440 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3325.443473] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3325.445118] Call Trace: [ 3325.445660] dump_stack+0x107/0x167 [ 3325.446378] should_fail.cold+0x5/0xa [ 3325.447133] ? getname_flags.part.0+0x50/0x4f0 [ 3325.448036] should_failslab+0x5/0x20 [ 3325.448788] kmem_cache_alloc+0x5b/0x310 [ 3325.449599] getname_flags.part.0+0x50/0x4f0 [ 3325.450468] getname+0x8e/0xd0 [ 3325.451104] do_sys_openat2+0xf9/0x420 [ 3325.451900] ? build_open_flags+0x6f0/0x6f0 [ 3325.452792] ? rcu_read_lock_any_held+0x75/0xa0 [ 3325.453767] __x64_sys_openat+0x13f/0x1f0 [ 3325.454609] ? __ia32_sys_open+0x1c0/0x1c0 [ 3325.455476] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3325.456558] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3325.457636] do_syscall_64+0x33/0x40 [ 3325.458400] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3325.459457] RIP: 0033:0x7f5b6604da04 [ 3325.460224] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 3325.464025] RSP: 002b:00007f5b6360fed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 3325.465596] RAX: ffffffffffffffda RBX: 00007f5b660e4970 RCX: 00007f5b6604da04 [ 3325.467066] RDX: 0000000000000002 RSI: 00007f5b63610000 RDI: 00000000ffffff9c [ 3325.468543] RBP: 00007f5b63610000 R08: 0000000000000000 R09: ffffffffffffffff [ 3325.470013] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 3325.471480] R13: 0000000000000008 R14: 00000000200004a0 R15: 0000000000000004 18:18:05 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x100000000000000, &(0x7f0000000140)=@un=@abs, 0x80) [ 3325.614288] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:18:05 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400020801000470000000f80106f0b0c2bb837477b01ace74d3172125c14c7915c19cebc8922cb61a722961737658435af43421b0cbdd87d9cb3e3bc541ed57f850121e947fd3489f02a4c7eaca98eb57122c8fa6cb3172c9138d27c61e931a295f78473d1212bd2db219ac2eae2d54435cafd6edc66797c0", 0x83, 0x4}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r3, 0x400448dd, &(0x7f0000000380)={0x0, 0x0, "b680db"}) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pidfd_open(0x0, 0x0) r5 = signalfd4(r0, &(0x7f00000015c0)={[0x1]}, 0x8, 0x80000) perf_event_open(&(0x7f0000001540)={0x0, 0x80, 0x3, 0xed, 0x8, 0x4, 0x0, 0x3, 0x1000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3f, 0x1, @perf_bp={&(0x7f0000001500), 0x4}, 0x20, 0x0, 0x6, 0x8, 0xcde, 0x3ff, 0x3, 0x0, 0xff, 0x0, 0x4}, 0x0, 0x7, r5, 0x1) bind(r4, &(0x7f0000000180)=@nl=@proc={0x10, 0x0, 0x25dfdbfb, 0x10000000}, 0x80) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f0000000480)={0x0, 0x1000, "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"}) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r6, 0x400448dd, &(0x7f0000000380)={0x0, 0x0, "b680db"}) pwrite64(r6, &(0x7f00000002c0)="4e3ff85a2e57e984873116728f1545d8ea5321d0e6ab4bde0138df59b089b1b7944c44375700dea071a08074e6503c0fd0804117735b6259a0983becaebf3a58cf0afd58e58dfa97042b08045697cee89fc1736c2cd5fd3528", 0x59, 0x1000) fallocate(r2, 0x0, 0x0, 0x8800000) r7 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r7, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x80, 0xba) lsetxattr$security_capability(&(0x7f0000000240)='\x00', &(0x7f0000000340), &(0x7f00000014c0)=@v1={0x1000000, [{0x7fffffff, 0x5}]}, 0xc, 0x3) 18:18:05 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 22) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3325.665186] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:18:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:18:05 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x200000000000000, &(0x7f0000000140)=@un=@abs, 0x80) [ 3325.801411] FAULT_INJECTION: forcing a failure. [ 3325.801411] name failslab, interval 1, probability 0, space 0, times 0 [ 3325.802695] CPU: 1 PID: 21479 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3325.803384] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3325.804274] Call Trace: [ 3325.804562] dump_stack+0x107/0x167 [ 3325.804954] should_fail.cold+0x5/0xa [ 3325.805375] ? create_object.isra.0+0x3a/0xa20 [ 3325.805840] should_failslab+0x5/0x20 [ 3325.806223] kmem_cache_alloc+0x5b/0x310 [ 3325.806659] create_object.isra.0+0x3a/0xa20 [ 3325.807138] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3325.807652] kmem_cache_alloc+0x159/0x310 [ 3325.808098] getname_flags.part.0+0x50/0x4f0 [ 3325.808573] getname+0x8e/0xd0 [ 3325.808915] do_sys_openat2+0xf9/0x420 [ 3325.809330] ? build_open_flags+0x6f0/0x6f0 [ 3325.809802] ? rcu_read_lock_any_held+0x75/0xa0 [ 3325.810300] __x64_sys_openat+0x13f/0x1f0 [ 3325.810742] ? __ia32_sys_open+0x1c0/0x1c0 [ 3325.811167] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3325.811753] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3325.812328] do_syscall_64+0x33/0x40 [ 3325.812742] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3325.813315] RIP: 0033:0x7f5b6604da04 [ 3325.813742] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 3325.815799] RSP: 002b:00007f5b6360fed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 3325.816658] RAX: ffffffffffffffda RBX: 00007f5b660e4970 RCX: 00007f5b6604da04 [ 3325.817474] RDX: 0000000000000002 RSI: 00007f5b63610000 RDI: 00000000ffffff9c [ 3325.818223] RBP: 00007f5b63610000 R08: 0000000000000000 R09: ffffffffffffffff [ 3325.819017] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 3325.819810] R13: 0000000000000008 R14: 00000000200004a0 R15: 0000000000000004 18:18:05 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:18:05 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3326.013997] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3326.047374] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3326.536610] FAT-fs (loop7): Unrecognized mount option "./file0" or missing value [ 3327.787667] Bluetooth: hci0: command 0x0c1a tx timeout [ 3329.834686] Bluetooth: hci0: command 0x0c1a tx timeout [ 3331.883665] Bluetooth: hci0: command 0x0c1a tx timeout [ 3333.931679] Bluetooth: hci0: command 0x0c1a tx timeout 18:18:20 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 23) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:18:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:18:20 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:18:20 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:18:20 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x300000000000000, &(0x7f0000000140)=@un=@abs, 0x80) 18:18:20 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, 0x0, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:18:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:18:20 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="0101906d6b6661740002f800", 0xc}, {0x0, 0x0, 0x1000a02}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) 18:18:20 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x400000000000000, &(0x7f0000000140)=@un=@abs, 0x80) [ 3340.881180] FAULT_INJECTION: forcing a failure. [ 3340.881180] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3340.883088] CPU: 0 PID: 21517 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3340.884142] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3340.885331] Call Trace: [ 3340.885728] dump_stack+0x107/0x167 [ 3340.886256] should_fail.cold+0x5/0xa [ 3340.886819] strncpy_from_user+0x34/0x470 [ 3340.887433] getname_flags.part.0+0x95/0x4f0 [ 3340.888078] getname+0x8e/0xd0 [ 3340.888547] do_sys_openat2+0xf9/0x420 [ 3340.889113] ? build_open_flags+0x6f0/0x6f0 [ 3340.889757] ? rcu_read_lock_any_held+0x75/0xa0 [ 3340.890445] __x64_sys_openat+0x13f/0x1f0 [ 3340.891053] ? __ia32_sys_open+0x1c0/0x1c0 [ 3340.891680] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3340.892447] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3340.893160] do_syscall_64+0x33/0x40 [ 3340.893678] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3340.894372] RIP: 0033:0x7f5b6604da04 [ 3340.894885] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 3340.897392] RSP: 002b:00007f5b6360fed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 3340.898444] RAX: ffffffffffffffda RBX: 00007f5b660e4970 RCX: 00007f5b6604da04 [ 3340.899418] RDX: 0000000000000002 RSI: 00007f5b63610000 RDI: 00000000ffffff9c [ 3340.900394] RBP: 00007f5b63610000 R08: 0000000000000000 R09: ffffffffffffffff [ 3340.901370] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 3340.902353] R13: 0000000000000008 R14: 00000000200004a0 R15: 0000000000000004 18:18:21 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 24) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3340.923364] FAT-fs (loop7): bogus number of reserved sectors [ 3340.924373] FAT-fs (loop7): Can't find a valid FAT filesystem [ 3341.024112] FAT-fs (loop7): bogus number of reserved sectors [ 3341.025445] FAT-fs (loop7): Can't find a valid FAT filesystem [ 3341.098147] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3341.115439] EXT4-fs (loop0): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3341.122031] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:18:21 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x500000000000000, &(0x7f0000000140)=@un=@abs, 0x80) [ 3341.184605] FAULT_INJECTION: forcing a failure. [ 3341.184605] name failslab, interval 1, probability 0, space 0, times 0 [ 3341.187959] CPU: 1 PID: 21553 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3341.189526] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3341.191376] Call Trace: [ 3341.191898] dump_stack+0x107/0x167 [ 3341.192619] should_fail.cold+0x5/0xa [ 3341.193385] ? __alloc_file+0x21/0x320 [ 3341.194273] should_failslab+0x5/0x20 [ 3341.195093] kmem_cache_alloc+0x5b/0x310 [ 3341.196130] __alloc_file+0x21/0x320 [ 3341.196876] alloc_empty_file+0x6d/0x170 [ 3341.197699] path_openat+0xe3/0x26f0 [ 3341.198447] ? path_lookupat+0x860/0x860 [ 3341.199254] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3341.200296] ? lock_acquire+0x197/0x470 [ 3341.201095] do_filp_open+0x190/0x3e0 [ 3341.201855] ? may_open_dev+0xf0/0xf0 [ 3341.202611] ? __alloc_fd+0x2b8/0x630 [ 3341.203370] ? lock_downgrade+0x6d0/0x6d0 [ 3341.204193] ? do_raw_spin_lock+0x121/0x260 [ 3341.205068] ? rwlock_bug.part.0+0x90/0x90 18:18:21 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, 0x0, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3341.205944] ? _raw_spin_unlock+0x1a/0x30 [ 3341.206902] ? __alloc_fd+0x2b8/0x630 [ 3341.207688] do_sys_openat2+0x171/0x420 [ 3341.208506] ? build_open_flags+0x6f0/0x6f0 [ 3341.209394] ? rcu_read_lock_any_held+0x75/0xa0 [ 3341.210359] __x64_sys_openat+0x13f/0x1f0 [ 3341.211200] ? __ia32_sys_open+0x1c0/0x1c0 [ 3341.212066] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3341.213131] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3341.214197] do_syscall_64+0x33/0x40 [ 3341.214943] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3341.215999] RIP: 0033:0x7f5b6604da04 [ 3341.216838] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 3341.221152] RSP: 002b:00007f5b6360fed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 3341.222801] RAX: ffffffffffffffda RBX: 00007f5b660e4970 RCX: 00007f5b6604da04 [ 3341.224447] RDX: 0000000000000002 RSI: 00007f5b63610000 RDI: 00000000ffffff9c [ 3341.226023] RBP: 00007f5b63610000 R08: 0000000000000000 R09: ffffffffffffffff [ 3341.227740] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 3341.229213] R13: 0000000000000008 R14: 00000000200004a0 R15: 0000000000000004 18:18:21 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:18:21 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d4b66730e666100f801", 0xd}, {0x0, 0x0, 0x1000a00}], 0x9d086bbed8e961f6, &(0x7f00000000c0)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x98) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x28, 0x3f7, 0x400, 0x70bd2c, 0x25dfdbfd, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x84000) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x10000, 0x102) fallocate(r2, 0x1, 0x0, 0x8800000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x200, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000001c0)={0x0, 0x4f8, 0x9, 0xa6c9, 0x7}) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) r5 = creat(0x0, 0x0) sendmmsg$inet6(r5, 0x0, 0x0, 0x40) utimensat(r5, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={{0x77359400}, {0x0, 0x2710}}, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000040), &(0x7f00000004c0)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x1) 18:18:21 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x600000000000000, &(0x7f0000000140)=@un=@abs, 0x80) 18:18:21 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:18:21 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 25) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:18:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:18:21 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x700000000000000, &(0x7f0000000140)=@un=@abs, 0x80) [ 3341.608192] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:18:21 executing program 7: recvfrom(0xffffffffffffffff, &(0x7f00000001c0)=""/29, 0x1d, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chroot(&(0x7f00000000c0)='./file0\x00') chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) [ 3341.749456] FAULT_INJECTION: forcing a failure. [ 3341.749456] name failslab, interval 1, probability 0, space 0, times 0 [ 3341.752188] CPU: 0 PID: 21584 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3341.753605] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3341.755317] Call Trace: [ 3341.755607] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3341.755866] dump_stack+0x107/0x167 [ 3341.755893] should_fail.cold+0x5/0xa [ 3341.759219] ? create_object.isra.0+0x3a/0xa20 [ 3341.760161] should_failslab+0x5/0x20 [ 3341.760947] kmem_cache_alloc+0x5b/0x310 [ 3341.761793] create_object.isra.0+0x3a/0xa20 [ 3341.762692] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3341.763726] kmem_cache_alloc+0x159/0x310 [ 3341.764575] __alloc_file+0x21/0x320 [ 3341.765346] alloc_empty_file+0x6d/0x170 [ 3341.766189] path_openat+0xe3/0x26f0 [ 3341.766955] ? path_lookupat+0x860/0x860 [ 3341.767783] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3341.768856] ? lock_acquire+0x197/0x470 [ 3341.769691] do_filp_open+0x190/0x3e0 [ 3341.770467] ? may_open_dev+0xf0/0xf0 [ 3341.771242] ? __alloc_fd+0x2b8/0x630 [ 3341.772014] ? lock_downgrade+0x6d0/0x6d0 [ 3341.772862] ? do_raw_spin_lock+0x121/0x260 [ 3341.773753] ? rwlock_bug.part.0+0x90/0x90 [ 3341.774624] ? _raw_spin_unlock+0x1a/0x30 [ 3341.775460] ? __alloc_fd+0x2b8/0x630 [ 3341.776249] do_sys_openat2+0x171/0x420 [ 3341.777057] ? build_open_flags+0x6f0/0x6f0 [ 3341.777956] ? rcu_read_lock_any_held+0x75/0xa0 [ 3341.778902] __x64_sys_openat+0x13f/0x1f0 [ 3341.779740] ? __ia32_sys_open+0x1c0/0x1c0 [ 3341.780604] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3341.781673] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3341.782726] do_syscall_64+0x33/0x40 [ 3341.783480] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3341.784519] RIP: 0033:0x7f5b6604da04 [ 3341.785275] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 3341.789025] RSP: 002b:00007f5b6360fed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 3341.790579] RAX: ffffffffffffffda RBX: 00007f5b660e4970 RCX: 00007f5b6604da04 [ 3341.792023] RDX: 0000000000000002 RSI: 00007f5b63610000 RDI: 00000000ffffff9c [ 3341.793470] RBP: 00007f5b63610000 R08: 0000000000000000 R09: ffffffffffffffff [ 3341.794938] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 3341.796379] R13: 0000000000000008 R14: 00000000200004a0 R15: 0000000000000004 [ 3341.840519] EXT4-fs (loop0): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:18:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:18:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:18:35 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file1\x00') chroot(&(0x7f00000002c0)='./file0/file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x109542, 0x8) r0 = creat(&(0x7f0000000000)='./file1\x00', 0x85) r1 = creat(0x0, 0x0) sendmmsg$inet6(r1, 0x0, 0x0, 0x40) mknodat$null(r1, &(0x7f00000001c0)='./file1\x00', 0x200, 0x103) r2 = socket$netlink(0x10, 0x3, 0x5) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r3, 0x400448dd, &(0x7f0000000380)={0x0, 0x0, "b680db"}) fcntl$dupfd(r2, 0x0, r3) fallocate(r0, 0x0, 0x0, 0x8800000) chroot(&(0x7f00000000c0)='./file0/../file0\x00') r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000140)={0x2, 0x100000000}) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x200, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$TIPC_CMD_DISABLE_BEARER(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r6, 0x23, 0x70bd2e, 0x25dfdbfb, {{}, {}, {0x10, 0x13, @l2={'eth', 0x3a, 'vcan0\x00'}}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x8004}, 0x24044010) creat(&(0x7f0000000240)='./file1\x00', 0x0) 18:18:35 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x800000000000000, &(0x7f0000000140)=@un=@abs, 0x80) 18:18:35 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, 0x0, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:18:35 executing program 0: sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x4000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x10, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000600)={{0x1, 0x1, 0x18}, './file0\x00'}) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f00000002c0)={{}, {r0, r1+60000000}}, &(0x7f0000000300)) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000001a0001010000000000000000e9ffffff346c8f25ec5b0000"], 0x1c}}, 0x0) readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/183, 0xb7}, {&(0x7f0000000400)=""/253, 0xfd}], 0x2) unshare(0x48020200) preadv(r2, &(0x7f0000000a80)=[{&(0x7f0000000500)=""/221, 0xdd}, {&(0x7f0000000340)=""/156, 0x9c}, {&(0x7f0000000600)}, {&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/166, 0xa6}, {&(0x7f00000007c0)=""/151, 0x97}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/199, 0xc7}], 0x8, 0x8, 0xb82) 18:18:35 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 26) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:18:35 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3355.185187] FAULT_INJECTION: forcing a failure. [ 3355.185187] name failslab, interval 1, probability 0, space 0, times 0 [ 3355.188055] CPU: 1 PID: 21622 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3355.189450] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3355.191148] Call Trace: [ 3355.191693] dump_stack+0x107/0x167 [ 3355.192442] should_fail.cold+0x5/0xa [ 3355.193228] ? security_file_alloc+0x34/0x170 [ 3355.194145] should_failslab+0x5/0x20 [ 3355.194905] kmem_cache_alloc+0x5b/0x310 [ 3355.195725] security_file_alloc+0x34/0x170 [ 3355.196585] __alloc_file+0xb6/0x320 [ 3355.197329] alloc_empty_file+0x6d/0x170 [ 3355.198197] path_openat+0xe3/0x26f0 [ 3355.198948] ? path_lookupat+0x860/0x860 [ 3355.199756] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3355.200793] ? lock_acquire+0x197/0x470 [ 3355.201591] do_filp_open+0x190/0x3e0 [ 3355.202359] ? may_open_dev+0xf0/0xf0 [ 3355.203116] ? __alloc_fd+0x2b8/0x630 [ 3355.203873] ? lock_downgrade+0x6d0/0x6d0 [ 3355.204695] ? do_raw_spin_lock+0x121/0x260 [ 3355.205552] ? rwlock_bug.part.0+0x90/0x90 [ 3355.206410] ? _raw_spin_unlock+0x1a/0x30 [ 3355.207231] ? __alloc_fd+0x2b8/0x630 [ 3355.207996] do_sys_openat2+0x171/0x420 [ 3355.208783] ? ktime_get+0x158/0x1f0 [ 3355.209519] ? build_open_flags+0x6f0/0x6f0 [ 3355.210415] ? clockevents_program_event+0x131/0x360 [ 3355.211422] ? tick_program_event+0xa8/0x140 [ 3355.212297] __x64_sys_openat+0x13f/0x1f0 [ 3355.213117] ? __ia32_sys_open+0x1c0/0x1c0 [ 3355.213987] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3355.215026] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3355.216085] do_syscall_64+0x33/0x40 [ 3355.216832] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3355.217863] RIP: 0033:0x7f5b6604da04 [ 3355.218602] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 3355.222236] RSP: 002b:00007f5b6360fed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 3355.223736] RAX: ffffffffffffffda RBX: 00007f5b660e4970 RCX: 00007f5b6604da04 [ 3355.225143] RDX: 0000000000000002 RSI: 00007f5b63610000 RDI: 00000000ffffff9c [ 3355.226560] RBP: 00007f5b63610000 R08: 0000000000000000 R09: ffffffffffffffff [ 3355.227965] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 3355.229371] R13: 0000000000000008 R14: 00000000200004a0 R15: 0000000000000004 [ 3355.266568] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3355.381414] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:18:35 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xe00000000000000, &(0x7f0000000140)=@un=@abs, 0x80) 18:18:35 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:18:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:18:35 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 27) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:18:35 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x1100000000000000, &(0x7f0000000140)=@un=@abs, 0x80) 18:18:35 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040), 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:18:35 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3355.567085] FAULT_INJECTION: forcing a failure. [ 3355.567085] name failslab, interval 1, probability 0, space 0, times 0 [ 3355.568371] CPU: 0 PID: 21650 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3355.569135] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3355.570063] Call Trace: [ 3355.570355] dump_stack+0x107/0x167 [ 3355.570757] should_fail.cold+0x5/0xa [ 3355.571171] ? create_object.isra.0+0x3a/0xa20 [ 3355.571685] should_failslab+0x5/0x20 [ 3355.572099] kmem_cache_alloc+0x5b/0x310 [ 3355.572538] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 3355.573136] create_object.isra.0+0x3a/0xa20 [ 3355.573610] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3355.574171] kmem_cache_alloc+0x159/0x310 [ 3355.574632] security_file_alloc+0x34/0x170 [ 3355.575100] __alloc_file+0xb6/0x320 [ 3355.575507] alloc_empty_file+0x6d/0x170 [ 3355.575947] path_openat+0xe3/0x26f0 [ 3355.576353] ? path_lookupat+0x860/0x860 [ 3355.576803] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3355.577374] ? lock_acquire+0x197/0x470 [ 3355.577819] do_filp_open+0x190/0x3e0 [ 3355.578225] ? may_open_dev+0xf0/0xf0 [ 3355.578654] ? __alloc_fd+0x2b8/0x630 [ 3355.579075] ? lock_downgrade+0x6d0/0x6d0 [ 3355.579535] ? do_raw_spin_lock+0x121/0x260 [ 3355.580021] ? rwlock_bug.part.0+0x90/0x90 [ 3355.580496] ? _raw_spin_unlock+0x1a/0x30 [ 3355.580964] ? __alloc_fd+0x2b8/0x630 [ 3355.581391] do_sys_openat2+0x171/0x420 [ 3355.581844] ? build_open_flags+0x6f0/0x6f0 [ 3355.582320] ? rcu_read_lock_any_held+0x75/0xa0 [ 3355.582833] __x64_sys_openat+0x13f/0x1f0 [ 3355.583287] ? __ia32_sys_open+0x1c0/0x1c0 [ 3355.583767] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3355.584363] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3355.584938] do_syscall_64+0x33/0x40 [ 3355.585352] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3355.585946] RIP: 0033:0x7f5b6604da04 [ 3355.586371] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 3355.588431] RSP: 002b:00007f5b6360fed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 3355.589294] RAX: ffffffffffffffda RBX: 00007f5b660e4970 RCX: 00007f5b6604da04 [ 3355.590105] RDX: 0000000000000002 RSI: 00007f5b63610000 RDI: 00000000ffffff9c [ 3355.590900] RBP: 00007f5b63610000 R08: 0000000000000000 R09: ffffffffffffffff [ 3355.591697] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 3355.592490] R13: 0000000000000008 R14: 00000000200004a0 R15: 0000000000000004 18:18:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:18:35 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x2800000000000000, &(0x7f0000000140)=@un=@abs, 0x80) 18:18:35 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 28) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3355.937403] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3356.017273] FAULT_INJECTION: forcing a failure. [ 3356.017273] name failslab, interval 1, probability 0, space 0, times 0 [ 3356.020482] CPU: 1 PID: 21669 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3356.021948] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3356.023813] Call Trace: [ 3356.024361] dump_stack+0x107/0x167 [ 3356.025130] should_fail.cold+0x5/0xa [ 3356.025970] ? __d_alloc+0x2a/0x990 [ 3356.026738] should_failslab+0x5/0x20 [ 3356.027516] kmem_cache_alloc+0x5b/0x310 [ 3356.028365] __d_alloc+0x2a/0x990 [ 3356.029090] d_alloc_parallel+0x111/0x1bc0 [ 3356.030013] ? __d_lookup+0x396/0x760 [ 3356.030823] ? lock_downgrade+0x6d0/0x6d0 [ 3356.031687] ? find_held_lock+0x2c/0x110 [ 3356.032624] ? __d_lookup_rcu+0x6d0/0x6d0 [ 3356.033747] ? __d_lookup+0x3bf/0x760 [ 3356.034886] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3356.036300] lookup_open.isra.0+0x962/0x1270 [ 3356.037335] ? vfs_tmpfile+0x350/0x350 [ 3356.038258] ? __mnt_want_write+0x196/0x280 [ 3356.039314] path_openat+0x96f/0x26f0 [ 3356.040111] ? path_lookupat+0x860/0x860 [ 3356.040947] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3356.042071] ? lock_acquire+0x197/0x470 [ 3356.042908] do_filp_open+0x190/0x3e0 [ 3356.043792] ? may_open_dev+0xf0/0xf0 [ 3356.044587] ? do_raw_spin_lock+0x121/0x260 [ 3356.045472] ? rwlock_bug.part.0+0x90/0x90 [ 3356.046441] ? _raw_spin_unlock+0x1a/0x30 [ 3356.047295] ? __alloc_fd+0x2b8/0x630 [ 3356.048090] do_sys_openat2+0x171/0x420 [ 3356.048915] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3356.050054] ? build_open_flags+0x6f0/0x6f0 [ 3356.050951] ? fput_many+0xe/0x1a0 [ 3356.051695] __x64_sys_openat+0x13f/0x1f0 [ 3356.052538] ? __ia32_sys_open+0x1c0/0x1c0 [ 3356.053441] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3356.054549] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3356.055632] do_syscall_64+0x33/0x40 [ 3356.056401] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3356.057451] RIP: 0033:0x7f5b6604da04 [ 3356.058247] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 3356.062045] RSP: 002b:00007f5b6360fed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 3356.063613] RAX: ffffffffffffffda RBX: 00007f5b660e4970 RCX: 00007f5b6604da04 [ 3356.065079] RDX: 0000000000000002 RSI: 00007f5b63610000 RDI: 00000000ffffff9c [ 3356.066570] RBP: 00007f5b63610000 R08: 0000000000000000 R09: ffffffffffffffff [ 3356.068035] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 3356.069492] R13: 0000000000000008 R14: 00000000200004a0 R15: 0000000000000004 [ 3357.354663] Bluetooth: hci0: command 0x0c1a tx timeout 18:18:49 executing program 0: sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x4000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x10, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000600)={{0x1, 0x1, 0x18}, './file0\x00'}) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f00000002c0)={{}, {r0, r1+60000000}}, &(0x7f0000000300)) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000001a0001010000000000000000e9ffffff346c8f25ec5b0000"], 0x1c}}, 0x0) readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/183, 0xb7}, {&(0x7f0000000400)=""/253, 0xfd}], 0x2) unshare(0x48020200) preadv(r2, &(0x7f0000000a80)=[{&(0x7f0000000500)=""/221, 0xdd}, {&(0x7f0000000340)=""/156, 0x9c}, {&(0x7f0000000600)}, {&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/166, 0xa6}, {&(0x7f00000007c0)=""/151, 0x97}, {&(0x7f0000000880)=""/212, 0xd4}, {&(0x7f0000000980)=""/199, 0xc7}], 0x8, 0x8, 0xb82) 18:18:49 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:18:49 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x3600000000000000, &(0x7f0000000140)=@un=@abs, 0x80) 18:18:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:18:49 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040), 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:18:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:18:49 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 29) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:18:49 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x4, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) socket$nl_audit(0x10, 0x3, 0x9) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) chroot(&(0x7f0000000140)='./file0\x00') ioctl(r1, 0x2, &(0x7f00000002c0)="f1c97f6857856bcf889c9a5914a24a0101dae09019e5682818c68c8093b311020fe203d7294af8c1eb72ef930557e8bb28a1c128e367461f9ecb3baba306adcc2d97fc885ba8229c407a3034d5e055a9e0bd2bb6025969cb4c1d28284c77e583b7e3074bb73afa190e2ab0deadae1960a01a6ea4abe1ce0058ebe86856ed8645eedfb0bdfe9d18529edf551799c6e438a6f992fc738377b7") fallocate(r0, 0x0, 0x0, 0x8800000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) 18:18:49 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x4000000000000000, &(0x7f0000000140)=@un=@abs, 0x80) [ 3369.251683] FAT-fs (loop7): Unrecognized mount option "./file0" or missing value [ 3369.266211] FAULT_INJECTION: forcing a failure. [ 3369.266211] name failslab, interval 1, probability 0, space 0, times 0 [ 3369.268177] CPU: 1 PID: 21695 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3369.269126] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3369.270270] Call Trace: [ 3369.270634] dump_stack+0x107/0x167 [ 3369.271151] should_fail.cold+0x5/0xa [ 3369.271683] ? create_object.isra.0+0x3a/0xa20 [ 3369.272316] should_failslab+0x5/0x20 [ 3369.272825] kmem_cache_alloc+0x5b/0x310 [ 3369.273392] create_object.isra.0+0x3a/0xa20 [ 3369.273986] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3369.274658] kmem_cache_alloc+0x159/0x310 [ 3369.275237] __d_alloc+0x2a/0x990 [ 3369.275731] d_alloc_parallel+0x111/0x1bc0 [ 3369.276318] ? __d_lookup+0x396/0x760 [ 3369.276848] ? lock_downgrade+0x6d0/0x6d0 [ 3369.277419] ? find_held_lock+0x2c/0x110 [ 3369.277992] ? __d_lookup_rcu+0x6d0/0x6d0 [ 3369.278567] ? __d_lookup+0x3bf/0x760 [ 3369.279099] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3369.279815] lookup_open.isra.0+0x962/0x1270 [ 3369.280420] ? vfs_tmpfile+0x350/0x350 [ 3369.280964] ? __mnt_want_write+0x196/0x280 [ 3369.281558] path_openat+0x96f/0x26f0 [ 3369.282095] ? path_lookupat+0x860/0x860 [ 3369.282653] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3369.283385] ? lock_acquire+0x197/0x470 [ 3369.283937] do_filp_open+0x190/0x3e0 [ 3369.284462] ? may_open_dev+0xf0/0xf0 [ 3369.284991] ? do_raw_spin_lock+0x121/0x260 [ 3369.285582] ? rwlock_bug.part.0+0x90/0x90 [ 3369.286208] ? _raw_spin_unlock+0x1a/0x30 [ 3369.286779] ? __alloc_fd+0x2b8/0x630 [ 3369.287310] do_sys_openat2+0x171/0x420 [ 3369.287846] ? build_open_flags+0x6f0/0x6f0 [ 3369.288448] ? rcu_read_lock_any_held+0x75/0xa0 [ 3369.289084] __x64_sys_openat+0x13f/0x1f0 [ 3369.289648] ? __ia32_sys_open+0x1c0/0x1c0 [ 3369.290232] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3369.290947] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3369.291673] do_syscall_64+0x33/0x40 [ 3369.292183] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3369.292880] RIP: 0033:0x7f5b6604da04 [ 3369.293394] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 3369.295929] RSP: 002b:00007f5b6360fed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 3369.296960] RAX: ffffffffffffffda RBX: 00007f5b660e4970 RCX: 00007f5b6604da04 [ 3369.297935] RDX: 0000000000000002 RSI: 00007f5b63610000 RDI: 00000000ffffff9c [ 3369.298902] RBP: 00007f5b63610000 R08: 0000000000000000 R09: ffffffffffffffff [ 3369.299874] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 3369.300851] R13: 0000000000000008 R14: 00000000200004a0 R15: 0000000000000004 [ 3369.378390] FAT-fs (loop7): Unrecognized mount option "./file0" or missing value 18:18:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:18:49 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x6000000000000000, &(0x7f0000000140)=@un=@abs, 0x80) 18:18:49 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000001580), 0xeb4, 0x28000) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x129040, 0xc2) openat(r0, &(0x7f00000000c0)='./file1\x00', 0x400001, 0xc) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file2\x00', 0x901000, 0x23) fallocate(r1, 0x0, 0x0, 0x8800000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) [ 3369.505209] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:18:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) [ 3369.538090] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:18:49 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) (fail_nth: 30) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:18:49 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:18:49 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xe803000000000000, &(0x7f0000000140)=@un=@abs, 0x80) [ 3369.712965] FAULT_INJECTION: forcing a failure. [ 3369.712965] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3369.714417] CPU: 1 PID: 21734 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 3369.715212] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3369.716158] Call Trace: [ 3369.716466] dump_stack+0x107/0x167 [ 3369.716878] should_fail.cold+0x5/0xa [ 3369.717313] _copy_to_user+0x2e/0x180 [ 3369.717746] simple_read_from_buffer+0xcc/0x160 [ 3369.718280] proc_fail_nth_read+0x198/0x230 [ 3369.718762] ? proc_sessionid_read+0x230/0x230 [ 3369.719277] ? security_file_permission+0x24e/0x570 [ 3369.719839] ? proc_sessionid_read+0x230/0x230 [ 3369.720343] vfs_read+0x228/0x580 [ 3369.720731] ksys_read+0x12d/0x260 [ 3369.721128] ? vfs_write+0xa70/0xa70 [ 3369.721555] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3369.722160] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3369.722748] do_syscall_64+0x33/0x40 [ 3369.723181] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3369.723762] RIP: 0033:0x7f5b6604d69c [ 3369.724187] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 3369.726227] RSP: 002b:00007f5b63610170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3369.727063] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f5b6604d69c [ 3369.727854] RDX: 000000000000000f RSI: 00007f5b636101e0 RDI: 0000000000000007 [ 3369.728644] RBP: 00007f5b636101d0 R08: 0000000000000000 R09: ffffffffffffffff [ 3369.729455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3369.730254] R13: 00007ffe451a3a3f R14: 00007f5b63610300 R15: 0000000000022000 [ 3369.894174] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:19:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:19:03 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040), 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:19:03 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040), 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:19:03 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xf401000000000000, &(0x7f0000000140)=@un=@abs, 0x80) 18:19:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:19:03 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:19:03 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:19:03 executing program 7: io_uring_enter(0xffffffffffffffff, 0x16eb, 0xbfc0, 0x3, &(0x7f0000000240)={[0x9d]}, 0x8) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c90516b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x17, 0x2, {0x7, './file1'}}, 0x10) openat(r0, &(0x7f0000000100)='./file2\x00', 0x105142, 0x2) ioctl$BTRFS_IOC_GET_FEATURES(r0, 0x80189439, &(0x7f00000001c0)) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) 18:19:03 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xf5ffffff00000000, &(0x7f0000000140)=@un=@abs, 0x80) [ 3383.825357] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:19:03 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3383.901471] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3383.914006] EXT4-fs (loop0): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3384.105233] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:19:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:19:19 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:19:19 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xfc00000000000000, &(0x7f0000000140)=@un=@abs, 0x80) 18:19:19 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:19:19 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:19:19 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = creat(0x0, 0x0) sendmmsg$inet6(r1, 0x0, 0x0, 0x40) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x0, 0x3}, 0x9, 0x2}}, &(0x7f0000000300), 0x1400) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000180)={@broadcast, @remote, r3}, 0xc) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000700)={'syztnl2\x00', &(0x7f0000000680)={'sit0\x00', 0x0, 0x4, 0x5, 0x9, 0x80000000, 0x10, @rand_addr=' \x01\x00', @private1={0xfc, 0x1, '\x00', 0x1}, 0x40, 0x8000, 0x3, 0xffffffff}}) r5 = socket$inet(0x2, 0x3, 0x80) connect$inet(r5, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r5, &(0x7f0000000000), 0x400000d, 0x100000000000000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) setsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000180)={@broadcast, @remote, r6}, 0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000740)=ANY=[@ANYBLOB="54050000", @ANYRES16=0x0, @ANYBLOB="08002bbd7000fddbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="8000028040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400060000004c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000019000400686173685f746f5f706f72745f6d617070696e670000000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000000000008000100", @ANYRES32=0x0, @ANYBLOB="a40102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000000000008000600", @ANYRES32=0x0, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r3, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400060b0000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004007f00000008000600", @ANYRES32=0x0, @ANYBLOB="3804010024000100616374697665706f726a00000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r4, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004008000000008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="b400028038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000300000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="080007000000000038000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000005000300030000000800040020000000"], 0x554}, 0x1, 0x0, 0x0, 0x4}, 0x40800) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) 18:19:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:19:19 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:19:19 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xfe80000000000000, &(0x7f0000000140)=@un=@abs, 0x80) 18:19:19 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:19:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:19:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) [ 3399.589606] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:19:19 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xfec0000000000000, &(0x7f0000000140)=@un=@abs, 0x80) [ 3399.620261] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3399.631795] EXT4-fs (loop0): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:19:19 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:19:19 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:19:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:19:19 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:19:19 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:19:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:19:20 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xff00000000000000, &(0x7f0000000140)=@un=@abs, 0x80) 18:19:20 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0xffffffff00000000, &(0x7f0000000140)=@un=@abs, 0x80) [ 3400.219204] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3400.250275] EXT4-fs (loop0): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3400.313188] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:19:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:19:35 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040), 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:19:35 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:19:35 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs, 0x80) 18:19:35 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:19:35 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040), 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:19:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:19:35 executing program 7: r0 = socket$inet(0x2, 0x3, 0x80) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000000000), 0x400000d, 0x100000000000000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000180)={@broadcast, @remote, r1}, 0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002940)={'team0\x00', 0x0}) r3 = socket$inet(0x2, 0x3, 0x80) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r3, &(0x7f0000000000), 0x400000d, 0x100000000000000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000180)={@broadcast, @remote, r4}, 0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000004800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004840)=0x14) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="eb3fb3992ca161e6de9d9e513d0bab28f1e71c430e7295f6adefb829b1248cee51561db8876c9e03ab572b09fc29a26b2a57f1dc7cccb0fb5000ce0f2d4cb004490b6134a77bf1ab4730809db5dc83c6749a694791a940fe98ecb7634f3c878e71dc93f436eaae86bfcc9e2c3c8ead8debb9fb8f08ebeb8ee75159e1b35b43feb1c3ed8ba10d6c8002849cf7b5e0c2dec9e2b92a6e429264e310e7dd092959d0a046fb80c26bc50515552d8417b00480076b24a779a2b667", 0xb8}, {&(0x7f0000000380)="4769247ad3e17bf4abe3e89bcf0310a7dd4a77b52d08dc3c9fa7204f98196e67635512eec9ca9e12d49db83a64ee08c1f0671788d336351381289ddad52ff556977cb6c1f59bb30ca27fec47886c7bb1654b172f66a329748d363adc012b5776f83fb65efd4a8e562d5705d1761f8bd08f946cf61284ce7eba5757d570d69cfb00d05441a7b537d090c6c560a1ce79689107fe34ba2751a67d392aa53f08ac2d179233dd160333afc7026be9e5d77bd72970c0b1e75bc1b22716565fe0a3cfc5dbb9b7", 0xc3}, {&(0x7f00000000c0)="62d4987478c9776d73d38618fc8cd62168c92abcccf226960e2467023cfe0525f4b57c", 0x23}, {&(0x7f0000000480)="fb4f6651cad7ca63cdc03569f549cbc1e418139b6386f88c9ee3ddb194e7bf49ca7fa553718bc6ee364bf71d1de9a02bc458e1c92aca042f86b5da4cf2e81d48fb3a923361a6031e96aa95a171247ea2596b347ccdfc3215a2cb0ea12651e01827921983bebbb065e0be82cd6498ec496a0eb5e64d9d951bbab6c291bc25b9d66107558cec8718e41527ac5fa753d11f746e4b3920827a4e0ee6cfe5c064a1f8869dbfa31dc4d64b4ed68e71822a529247b1716c9e2c9db61ff9dbebd31e9b1184dca6fd6a223e5bcefe2076bd399762", 0xd0}], 0x4, &(0x7f0000000240)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @broadcast, @remote}}}], 0x20}}, {{0x0, 0x0, &(0x7f00000028c0)=[{&(0x7f0000000580)="01655e0dc0ee503da3c828be2d276778656022faee4230", 0x17}, {&(0x7f00000005c0)="64c7cbca16813a96ca0d830977e3b739df437d201121f45f11edddadaa54a9b3f6c77803edcb3eb3a545523932ee3302a69b7119798ff8581654d16ea4fef58befb70252e86d7c4e3cfd62d4f7f4d204e266d0e58b950aa2af4b6dd8f0c32941e139295d8601596631a25a29e7610d0a8a4460cd0cedce8e7cd01bdcb44ba2e44287703e3a8426a458da89b69e9ed00efd1be6fa5ea71b712b879cba0ab2ec99d9ad431485e3875d53f373af6fefb1d34812b01c9d4c4b5cbe18eb509571d90c7d71a82e573f61ecfeab53804f", 0xcd}, {&(0x7f00000006c0)="a7ef4ebb999811109321db06e6cf10f284a79e7e0a9d5f7c2888083f029fcb493b298d31f09082f15dcce4085bdb0676db8bea83a9f59bf0ee1b7bfa7b56dc5aba0d42b90343e799ea7214fe580b0bf6c5337530fbeba9a96f3eb1bbbc3338b42f934caa64a70d11b540a686d41bfb5e1cf8d195ba2fa719fefb06baba0be6d266e7d6bd4545636d1b15880cfed9f91ebba040dbd430b5c9516b1ac5149f711434016fbbd3c46eee4fd48dcee524e4cb2269b160c63cb85edf67e457b900959e9224154b61280e1d6ee0adf434ec9915fbabfbd63ab8fd0db09b2ab9fb1e0360ecba2d1d0cabc07fa0412c0614b687db99eb7a1e7165a651ab5f619bc3e81db9319267a30140c2556c6a27ce2b4b69fb61558d56ae6df37eb462f774463fff8af735a4ba77688d00e8ae8a50cb6c35952890e2ec2368103de83c7fb58abfe64f4b431e58a0c60665adc7bce00c238691ecfc97278daaa18f25e412ba4840fca6ab4f5e3faa42523212053be322de1283120773aec1660c6b1f752ef7c377e4231d4a1f380e2090c914ec3d3749dbd84b9a32b1ec3f7fdb2e7a9e1e00efb612d86138c152fdc990c6b62f19c41abe5368dcad055c8712771334a10ec0bd18278a6693822aefbf94cfb3b0d68956ae8b85559577feb8dd764b1bd1b4a5e807f17c7ccb90876b455aad591e731a7d255fe49a1518b31e6512f122fa6a136722c1121ff9b8870c40f32322c63c16e666cc6040a2d1a22827e51b30f521c56dfb5a67174750ecfdcade1f06501c012733d8d9373a4a2a9efec6e0f35b5ef9407c407ea7d8ac7f396ec4cf56d38d142763cc63c0f371769701b2051101480bf1eaf72e803ab830bf9fbb35b001ebf8895833814e4ace68dc0abe7aba1b453e82ee284ead9f38643e44586a38047e89d3caeebfaf07cdc92ea9107ee48fe6b88e26359358ddebb42f2619c6a08e9d770cfbacd70cd769bc3da672000567ebd5f8527282fc2958690494242c53db27e3dbb876448338293d5a96d992caba6b91943d81f26c2b53bc431c4b9261a3ddb27ee225ad1cbda765b8200eac1974e387baef3994e609d1ec778d5461c6b0c94f384cede37bd05a7fc3c49fd28a061ef5167c045f8456ed32ca364553fbdeea56b107115512131d8ba5fbd88eba300a171f2a94c494645757d65e7d6722206172b0c757da6922f61ee4e0c0702eb86f51fd441dfef6289773b659571e7038cf73575ae558830e91669db31e6f97a775323789e32ab7f20545d16a0aa629446b10abb78350de8f8c5bcc4f8241a7b8ba0949b9193902cd5f6d8f350fbe46a070f3db14b7228fef04795fd1b63eaab349e5b808a158276a1714fe90d98405414b0eb40bd6848a70d71ad0110043a282d2eb5bbfdb938ea371375dea60ed7f08f1b56c6d881c241d17923c1e4bc53180a4cd6990ba87e6de0fa42e48e7c5dc3238fd460d581641eb6659ffefa18903d570876860d75477fefb4a3e58945283609075a4a2015af5fb55a61041826024af83d25da3838d21a39a89d100a831ac2e4b873c7f0e2edaad1876bce8509f628c33c99472d977d422a9025ed803e3376ace55b7c9a45ea0c7cabf9a9c74881491fe3c6fb1c2fca0d4fb8f317bd224c0b4a99d6510621a65021da344984afe02873eac8dec362b298b0fc5ca911ed81534cce16c151cda2d7443f76f423a20bf8fac61ded342385d4820c4191a06663f96abd23eeb8aefa2f5d3f31ebd0a93a04b80cdfcdc598424c2d4165e287b3848210ca6b6497f8a9b5b6c9fe16e69457d66c07fdba200e0f910d247b955e5ec54cef7b0c81568c75f509b4d4ba149ec2dc7073150b89054409a546aed231bf5642bb84c3fdfa45a8da03b55e117ea5e0deff224b226946d8548b898c25bd4e304026202b48350a04bc90952a9dfadc1a590b605767614f438ac999004114a164f2cdc6c16825555482ea16dc7feab8ee95560e4d1bb2928b48efa95f6e0f07066ffe7b0448007d510be5fa08a090a8d55caccc9c7fad4f67fbc59f301c2ff6c1e64faef73e5c79f4e20aaf4a58b014d908485ca2589141203c4e7fa51c761aa598e0204bcc32cc647eeafbd77388a9e0eb5c8e35c211641e2a73ba45d296334d80c5b2c85802d3813b11ea165e06a22f0022a555fd0828258fbc9fcd4f02cafe6ed599c9493c490d0fe8a321870938f9f9db4b0b96a6e8f31766499dd24254e2d78d5bc3c263d1ac517b4257bed67be773717140c1b7232fdfed8993f41056a66fea45e913a42b98b9ddbf4b70d210563a8cfcb936f0b367e5a6d379b90a589f4de8dfc12ce8d56df9e05997fa59b4eecc0b345ccedd7cc534379e0c55b502fef79cb0586d3151e2409340bd778401420ead14553c70e2978aa4730a1333bb7bca0520949d629afa3973316dc516161f9522e8f614d5d9bc2f72309cca86e38b85fda3c94c9e8b5dace848296c64f763b57cb72b67ec0cc9b427de0394a5c4a53b7522ef3be3c7b44ff4b7f3ca82865bc16b8e918bbac57c32376e83384b97f57bde3966b7caab0f69bf3393e0e11eb3f934f3870d7cb21d8f0c2a34d1fd6d3254a70f29b43591185046a8356e8b7c699ae45d29895aa62dc9a2d124df726afdf84ddcd5d8ba50e8e6a9eb908a98782d0277e8000921a3cca5ee5954a9cf975d45a5898e1fb366b8619a8b9d8e47dd250fc10deb4a323cdf03408f2bc9b9aff79a40cf2247047656d8e985af7b0ba5d1ee19e7d2c1b409b66dca2f767ac5b441783ec86c9a36759f281fdf0104ef5e14772a6c8805dcb615b3d2837272668b18dd6be4412b7a2a5ca6364ea077836588e1844acf8bdf29c43d5647a628636b67523070ff2be54d08afae308ea44d8b2151f801a28c7b4bc389df34c413c1547cab7062bcfe05bfa776d171b7435d14a03dd8809207f8eae75de9644009fb96b7a42970bfb9c9d121087ae3adbd7bee588ee2dcc14b2853cb9c0a9c8adba1c90d2f5daca53c6cdbe13fa3b93f2b71917b209d93c9de00dfe0a586673aa35596e702ac41213c523ea3a5490fe05de2c9913880b1102508b68e1ebb385defe33ab4a26b84c04f2bde9e5a45984e02359123790b9190d97a345644628d89cfc1a205cc23f30b86ed5cc3942d15a0588b1bfece64f7ff5d4dae6b360b99881b5d7e9c0d56fb9970db3abff60d6a7ddc2755472401b8a31ea84f6e843432a4658a725d2591ecb7f0edb16a678e03bf3a39b56a046695bd600e7cc7bd12b843b26fb94526729c9f0517757536bb3cf9ea39d0e99f84668792c7b1df29a77e4c4e26d89a9de191cd20835697cf9602c0a5015f4c245b44e8abc6838548e68e8853822119cda1c218a502dc93c0440e670d520d9a68adff286ff1d91e189e36f17ac3771d595a045b848900499fd91a482bc209801bf6234e9dfe7fcdbfdf8dd1ddbb152e3847ba6545c62106d4c6f0a6e95c5cd598ff951e2af549a8313b6a77b07d33896145e17a4b3a532af02003082247feb48da4340c2d2ab9f2a1ed71bf6fffe851a457f317a2c3f61005c1a927dff8728e5d0b3245cbbdba3df0853924277c2eef97f333ffb794ff285809e3bda00b6c50770d74ae6c0aa42f3496f48e84fe7b2d98dcd32fe3e59da4e78c23cd231074306f930a927bbb2d2947ca3dbf607552be4583c591f1cd1468157857e5cfa3bfca2ed8a12d9c5a5783fe074c3b340068b18ca54a60cde8df3333896532c5dea38311df444e93f0d66662f518122851cea90adb6aed3e1fa94fff8a458a4e9f63b4e5e9ec0c547f606e2304192443b279bda99cb5ed087f1f8848938d4b5dcc0394011508f59da981bd117141cc58b2697c3335a4c17b06e6795bfa6a95f951f85427051fcf7b2b1af8a1676ab65db92f0150cec5606e6bde5f3bb1cdcf92398110e255681810695214cb4e2f891b0aad14f9e1cb8161aa4c047398d33b59b8af97fb29840d69fbeb338ad593a38f521128846a18fb9bb8ce385c4a375d0990ed499290cc206d9250d3b081144f2a91bc71876b2c8b7da67b2326a23809e6b5bc76c00e36e44a412b98ac581ccd604200d56c0b80a20b5dc4cf01f1c67664f97a7d281252ba7f4ab08c55fbcd27928f23d9f5ae7e596609761d21afff024c094b6e3d71530da4effec2f76dd683b12729f19687a71c9fab173ff435c4be25a30eae08ee7551a39bf4686ec71be0dd8ee5d145d32dbe087a3d52011fd85f1e564cc22a226e04c34424ff0792ebe559606f51be2b60a4488b64bac1cbaf867867393af7840d635ede298e3ec993ab8aa767c9589ccabdde416026dbbbe508e567d036148efff676ab428d3fee1083b89d4210edec93cf47cd16eb638dedb5fb7e06aedcc876462645bb7015ce09a74ce1f281a185a87ef463a2569559b8e437ad20097cb9a0f83927e47bb85fd65f8615a55479f3fdee79396973a28005ccd8cca277e2e0b9fcacaf8cf95606804b64e0171349fb3246a01cffa81889c8e03806bf937cf040fa149322bdd75f5f6f77aeb780e2031354cab958043b4f43963760f158da37a54376f73f0547307108ce9e549b43535f333a72df37e1c3f9d1bf810207b08a21b1aeded0a0572931f0a0ed0f47ad950f9c246c9414895d1d3a74cd15553baa37b523b8e987beeaeff338e224d2c7bd6105d27e566211bc04f1679e4b68de61825867600e81982d883dbb4ee4137bb9506afd5d149e87aa8409e5a0e169260dac1eea52b5b842ce444b6f1a8f676d9228d4a204a4f731e38d9bd0ce02e4d719adb8e846887d94c4e2d3eed4c219eb483b0292853c58049b9b301825bda08dfe0167da647ce4593633951ee9e536e1fbdc45b57ad7d9439d5389ec4239b9a4162bafe8f0f0a0292cc8e381e48846fea97bbe908fc659600f6936153425779f18e75d95e651f46c480cb3d848465d646ae9a0913bc641071db6e5f2390b7cada61dce7dfb0f2533beeb9c60e35b07b63ee387bb24ebf240562b8e09ec4b3cc8f092b48c132f8b825fe0ce51aebeabdcd2b6d7603ae8edcd8399159647903dc14d0f14a1d6e6b5393d9ce2705d6f814c0c1f9ac294c20fa1707c969408111e35e9ce13af125c2c21638fed7a54f29f8486a1e4aa5f0d8773f244bcb2a84576fb6b0587b2db82d3b0c58f184338875b7191d78c0a486d643989cdc83bcf1ad698eb3eb1ade5027c46251f43cd5a469b8d21cd4924f15fd07236fc2f132588b1ff6832029b60eafd974d34a07beec3db4f4c9510138b479609e2010080a1fdf4f09f91b4e674fb8eb9466eff4bca889f7b9d076086ff69f4847214d5707ac0293e1e5786502e251c4787592bd6195c5577effcbddb6d9317aefc9f23931076d7f7f728f82aedd2b3519fb5932cb17d2d4fdc555d7dd4276acad5f6282f42f798e372263dce9f40302e3e8c67a3fad2e39110704997710ed889331f5c638255200b6dcdce6993351928d3612d73935fbea34585e2804336e5793eae04aa8faa3e39bc4bc5ad93e6cc6263e58daed78b1d246c70d806193da49fc5b6f6a68ea165cd03ea3efc08da0581b1c789072fd2969ff9463c1ec2738a16da2ef4f4aec36c992940b7abeaa9929eb6826b49929cf654283ce40740582ce124d9157e8ec3aaf4ed057d56ac08ec5aecb5efe542bbe94d3b92343a12dcf01a54767715096b169d7cf4e1d503e3b33ac80723cf65a1b2251a641cf137f768b9ab11456e0fd2f07b939fd5aecc1dcc3477d021182b67657173a5c977e14742c2cad5dad742391c463729eb43cfd88", 0x1000}, {&(0x7f00000016c0)="9ce6075a05bf3cd22c76984e0574dd5248ea0bf778089aeeefe34a6a6328774cf703fbe8a0b6efef588e35595856f54517b19ced018bf360a0205bfceb9356a0cffa3693b7710f083ac008671a4400b798bc53f054c5a338122aeecde76e23ca83754160fed71dc9eacc3be087b760e585b81183e08705e1", 0x78}, {&(0x7f0000001740)="aeea4fda6b7a959f74e47e34b1deb06b9722d94e37335038f19885159afffbf8a1418e2703d2c5e05da353ccc690fc5c400326618a4f1bef01954c48bed40194c9f232529a843d16b94e8385ac629d334e465fa26f71a595827911a671d0f7dec359eb5ee5b8d2431eb123d00b3b360f66227ae358850c30610580513389c3e6360009921ba21955fe1a4a95d97b0eabdb46d05b7bcfa49309eee7a5b5382e59ea137de96f0faa7fd04ef60766cba6bd7be453f26985290a686820287e71066c608e72524f78e2c86fc1fe5049377e62d1a999f2b823c42aaf22ef9372e524b50c69fe2dc631", 0xe6}, {&(0x7f0000001840)="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", 0x1000}, {&(0x7f0000002840)="dab5bb1f7676d3d82bf9e53254ccdcf28036f8c33101f2232a62562d6af4263a9eb90553a96ba5d89016f4145669cc4f20c3cf8f9e8e9b74c8408a8f0d05002655a7027bf5c3d80cd4f5f75ba3747759d7f2d287f5d9e8d1c129967780e3016ea407dfda6e2ddd16425317bd652a680fec32f03ba137023ab66488bd", 0x7c}], 0x7, &(0x7f0000004ac0)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=r2, @ANYBLOB="ac1e0001ffffffff0000000078000000000000000000000007000000000713d10a010100e0000001ac1e0101ac1414bb441c7d110a01010000000001ac1414aa00000001ac1414bb000001ff863500000001060aa846bfe253a56e96000471070702050ebfc7f19f0b87e9fcfbc2fe8b000e33574c87d2695e5df252b00105038500000011000000000000000000000001000000040000000000000014000000000000000000000002000000ff0700000000000014000000000000000000000007000000940401000000000014000000000000000000000001000000f8ffffff00000000efa2750eed99ad6795b7ef24faf28ccca2e3d421e234215f64609a847addcda8a5d347e1b0f756b54908088aaf9ff7a624e9f2ae7dde2815a13aa525ccf4152634f6139f6aaed63f5c1445e0c31041a641ce3b72a3e29b1f7cbe3a0eae28ececc88766bdd4ddf306fc246f6a27a9c15d58afe01434748b7f1fbdb784df344ac60354871251bdc4"], 0xf8}}, {{&(0x7f0000002a80)={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000003bc0)=[{&(0x7f0000002ac0)="b422062c7cfebb3da6f3acf891d518fb3093cf11d412b2", 0x17}, {&(0x7f0000002b00)="babc09499d4b36d76ec53a9d65b3843f1f3e0f3d2dfb083bb87439db47436ab1f2ba35c382a438aecd36a0511e66f94a067f9fa9dc5880e783ac8e99612f", 0x3e}, {&(0x7f0000002b40)="74b4fed815e2358128baf73d5376e6a4e2adaedbb447f77fdc58073c3f3fbb9e5de719901e2d91fc8f8be431589cdf78aade0e8854e7b9211d703ac180191f4c3f3d3457c7d013de8cecaf89166f83345a488ffcd86e3b33593d4b43732ee97316ccf4533aaa7385c4d7a19542da97", 0x6f}, {&(0x7f0000002bc0)="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", 0x1000}], 0x4, &(0x7f0000003c00)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @local, @broadcast}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x400}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7}}], 0x68}}, {{&(0x7f0000003c80)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1}}, 0x10, &(0x7f0000003f80)=[{&(0x7f0000003cc0)="f4a4e03819b19f3f1b50de526c097a829d91515e145af3bc9ac5d200c340e20655989bbe3dcecc377cb2051d2a7c0dc88c99a3c4ddc8c220f542cc94e9acc6d18d9b07e8bd44c0b29ca91be146c462424ab0bf49efebcf12c9aef0be7be50d6394cbef2cbea560fa4de58e3aeb9c71484b78462983ad68a3ece8dc4f3f02d8da980f7609fbefa79626c68784f5f67c209e476447f451abfc59d651699a8c6d427f3dfc14dda34d4baa5ff7e90d8095628c6f93580c7164969f", 0xb9}, {&(0x7f0000003d80)="5a39d655c668d0b4979819cf70b473e63b71a1f6f954c06989640d83e79955c7915bfb3f749b3bd071551a9d12ba4968aa3c9fd10ff01ceed64d95ebad39a25b4fe21bfe8a593a66c43219f6a18e8e32855a94ca30b942ef14a5061efcc4e8a429e672d52613c69401a7e0e5534afa2f375f0e1e3b260a67312c680065707c402ed499b1856be7d428573bf01e0520ca3b27082c7de0dac8edc4eedeb9db064d295ec21a854660e2d38befd3ffa8bf2fcd9a99ffa6332cdade26f42e69afbf6a82dd5979c4b1983bc5b4950c8b55948dd468e35596e27f4432baa4", 0xdb}, {&(0x7f0000003e80)="5af3aa94005bfb684c11ac63c0ddc8b1dd7f45069fb72e0acb2b1fa39c9ad2949abf64b9b4797b2e81e5114852b9ef24890368df831491e5f2aeefc45f4c4764a6392e23d84e65540c67ce0a7042c1e692b78e6903e581cedd6ef3f187d25d4bb251bbc345e6f8477c58221ce845e27624b0d0fc5f035f107ddca82613a8d74a7152b7dcb64b7895c1bcfcf4b392f1ad6de7785e48e138534873695c53775df17b6b562435fcdb09b1567aac96c952651c3bd0415244e31b1b3c23889f827ca29893b74ce0fdd05e18f3798c040a2e972e7257a3e05facd6a4743cc7478999d1a88270afa1ee9841f26aa9", 0xeb}], 0x3, &(0x7f0000003fc0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7ff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x2d}}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_retopts={{0x70, 0x0, 0x7, {[@lsrr={0x83, 0x3, 0x65}, @timestamp_prespec={0x44, 0x24, 0xc3, 0x3, 0x3, [{@dev={0xac, 0x14, 0x14, 0x2a}, 0xffff7fff}, {@loopback, 0x3}, {@multicast2, 0x2}, {@broadcast, 0x5066}]}, @lsrr={0x83, 0x1b, 0xf0, [@broadcast, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @remote, @dev={0xac, 0x14, 0x14, 0x19}]}, @lsrr={0x83, 0xf, 0xc2, [@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010102, @broadcast]}, @rr={0x7, 0xf, 0xa2, [@dev={0xac, 0x14, 0x14, 0xf}, @multicast2, @remote]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7}}, @ip_tos_u8={{0x11}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @broadcast}}}], 0x110}}, {{&(0x7f0000004100)={0x2, 0x1, @private=0xa010101}, 0x10, &(0x7f0000004200)=[{&(0x7f0000004140)="a410974403f4c06b1deb40dd9d1d81e06e3d7f40100bd51dee4b1711b7134d2c997fab01cf173b5858ca790773736ba61c1cad9bd49301dfe17fcedc14a2a9239712abc3e05eaffbbd7f412b51fa3c9ecd3e78f2906f2225a442c7b651ca66b80178d0261c221af6ff7b275c916c9c86c6ec4f74324ae83df3fd520f67b0f915b0c4ae07993ecc", 0x87}], 0x1, &(0x7f0000004240)=[@ip_ttl={{0x14, 0x0, 0x2, 0xffff}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x10001}}, @ip_ttl={{0x14, 0x0, 0x2, 0x38}}, @ip_ttl={{0x14}}], 0x78}}, {{&(0x7f00000042c0)={0x2, 0x4e21, @remote}, 0x10, &(0x7f00000046c0)=[{&(0x7f0000004300)="e3b4db8deda8025daddb10c5cc14997a87caa1ffd871b1d11c40a3ac8da5ba5e6ebae20b5edeb4d9d50d3de904855fd09ba739", 0x33}, {&(0x7f0000004340)="cc55914b3981befe046946581e8b5ae117ab4f5657b1e5f915e8eddced8c69501aa48c557aba27a591677deea0ee1bfa290681e6568b825d8cfaa4978fa778cf4a214c129caf3dfeb4b6a1abb15bbbe6d5026f940b8c4fff5703167baae6c5f923cf2ddbfd29fd997f3d10c425466c3760276cc0f5952803d9728540971569bee0440683ffbd4a95719ae0dbd33236e1d84d0e75e946dbcc59ed94ecea51591b", 0xa0}, {&(0x7f0000004400)="3590766527b3e1089b622f280000", 0xe}, {&(0x7f0000004440)="d5ce7fb494e36a5b86efcaded613158326da3f0d7ba0077c13f9911dd8c3d904e289ec4ff6e79c1737f9c4767982fb975a719452706f7c87bc6357dd052bbd5be36f2056acfb188adeeafa4c7b4a355a1f0cd2a0b50a14123d039fad58465c5b644cd1eb430015c87b9b6e14f358e88189ade7a6cb660dbe32792df31aa15814591b0ca68f38b9a25acfb23070ebfd0644a2bc2f21e5ce5437c8a6c3f15499e73de3253c4127535e28257f75ae59fdd5c7b2e6", 0xb3}, {&(0x7f0000004500)="f85c69a3de4d9d336771dff2ea68b76b7ded6142c84da59ea6add1006a46f1248a97f7aa6296575ff0085216f9a2ed3c13e74f479edcfef5faa94a7d48baaed9bc70008cfa7db2b46cd216ee26", 0x4d}, {&(0x7f0000004580)="2334ec5c6bc6ce3f1e804344f1a558d6aa21ad515582e04ee43b9f49f4350df6c7630e7f9517e3c4134e372d722942f439ab7e", 0x33}, {&(0x7f00000045c0)="273e310231983ee5b526be4339466175962eb234f019c968889691698980361bf4bd5342cc8cce66d0e71152f21edfe711d29e2dd65bdd661e26b4f05568447171a133f84755c180205331aebe0bebdfc537e2fbc1e7c0c705fef39cadb8ae670a45f83bef48271cffbc8d0758e4687218829fd268fce129a6888071ea82079621feb05587acacfc5c9429e6e9d3f4f9f12a89e12c06987bcf355a1ddb7c3df2532784fd38535ef74196bc1a3e707aadb8a3718db78f15ad588fe7c4420b2d73df6e8a0635997c9fbec5556657c6861e4ddf906afc1388a69e", 0xd9}], 0x7, &(0x7f0000004880)=[@ip_retopts={{0x80, 0x0, 0x7, {[@rr={0x7, 0xf, 0x6, [@empty, @local, @local]}, @rr={0x7, 0x17, 0xe5, [@multicast1, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote, @private]}, @noop, @end, @cipso={0x86, 0x47, 0x3, [{0x2, 0x7, "621b24e287"}, {0x1, 0xc, "1858535f0d2f0a417a1c"}, {0x2, 0x12, "4c833bb7abebd681b6c2aad44dbb3eec"}, {0x0, 0x2}, {0x1, 0x10, "dbed1216e8f10b8293c56be13e6c"}, {0x6, 0xa, "e8dd2713cfca0bf8"}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @private=0xa010101}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}], 0xb8}}], 0x6, 0x48000) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r6 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x8800000) r7 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r7, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) 18:19:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:19:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:19:36 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x2}, 0x80) 18:19:36 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3416.088006] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:19:36 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3416.152393] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:19:36 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x3}, 0x80) [ 3416.183534] EXT4-fs (loop0): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3416.217133] FAT-fs (loop7): Unrecognized mount option "bÔ˜txÉwmsÓ†üŒÖ!hÉ*¼Ìò&–$g<þ%ôµ|" or missing value [ 3416.411663] FAT-fs (loop7): Unrecognized mount option "bÔ˜txÉwmsÓ†üŒÖ!hÉ*¼Ìò&–$g<þ%ôµ|" or missing value [ 3416.602354] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:19:49 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:19:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:19:49 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:19:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:19:49 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:19:49 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x4}, 0x80) 18:19:49 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) fcntl$dupfd(r1, 0x0, r1) 18:19:49 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040), 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:19:50 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x5}, 0x80) 18:19:50 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3430.137177] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3430.173387] EXT4-fs (loop0): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3430.235319] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:20:04 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0/file0\x00'}) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x10041, 0x40) open$dir(&(0x7f0000000240)='./file0/../file0\x00', 0x1, 0x142) openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/mdstat\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x49, 0x0, 0x87ffffe) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) 18:20:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:20:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:20:04 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040), 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:20:04 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x6}, 0x80) 18:20:04 executing program 0: r0 = creat(0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) getdents64(r2, &(0x7f00000000c0)=""/149, 0x95) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r2, @ANYRESDEC, @ANYRESDEC=r0, @ANYRESHEX, @ANYBLOB="770ace553f45473ce93fc690209b37b2e491cff81c033804eb559e21b897ba58aec06db9d6f112a96615d1bc93244b0fa4a4c44f69e73fc65d8971685e82674bb3bd8a1c586d19933b1ad1add807a5264381b46b28a70151705762b31dbaf04723a1ec7528a6a8b77b02412e9d6aee5cf4b5189eef6193ad25ee478157e12417d23a0c97c96e96fd0e8ddc50beeef131ed6d8eebf0a689a0c5b3c7be9b2678ab5b3fe0878f000fced9ef95f32b859f1fd02d2264e0e247c70bb3c102f71848976e3f2a29139529fd8e92b4c7e4c11c52ed53780bcad8b3f58a8f0ecddbf969e0b50cda560ab24593b043fac38b727b4b82ca664b14"]) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r3 = epoll_create(0x3) dup2(r3, 0xffffffffffffffff) dup(r1) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r4, 0x400448dd, &(0x7f0000000380)={0x0, 0x0, "b680db"}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r4, 0x8983, &(0x7f0000000040)={0x8, 'erspan0\x00', {'macvlan1\x00'}, 0x400}) unshare(0x48020200) 18:20:04 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x18, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:20:04 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:20:04 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x7}, 0x80) 18:20:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:20:04 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x8}, 0x80) 18:20:04 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3444.763201] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:20:04 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) r0 = syz_open_dev$mouse(&(0x7f00000000c0), 0x0, 0x80000) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) utimensat(r0, &(0x7f00000001c0)='./file1\x00', &(0x7f00000002c0)={{r1, r2/1000+60000}}, 0x100) lsetxattr$security_selinux(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500), &(0x7f0000000540)='system_u:object_r:insmod_exec_t:s0\x00', 0x23, 0x1) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000001c0)={0x0, 0x0, 0x4}) move_mount(r3, &(0x7f0000000300)='./file0\x00', r0, &(0x7f0000000340)='./file1\x00', 0x12) chdir(&(0x7f0000000040)='./file0\x00') r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440), &(0x7f0000000480), 0x2, 0x2) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x8800000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) openat(r3, &(0x7f00000003c0)='./file0\x00', 0x80, 0x84) ioctl$FITRIM(r6, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, &(0x7f0000000380)={{0x1, 0x1, 0x18, r6, {0xb4d1}}, './file1\x00'}) [ 3444.826069] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:20:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:20:05 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3444.943832] SELinux: Context system_u:object_r:insmod_exec_t:s0 is not valid (left unmapped). 18:20:05 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0xe}, 0x80) 18:20:05 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3445.242309] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3445.430470] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3446.570661] Bluetooth: hci0: command 0x0c1a tx timeout [ 3448.618684] Bluetooth: hci0: command 0x0c1a tx timeout 18:20:20 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x11}, 0x80) 18:20:20 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={0x2c0400, 0x1c, 0x9}, 0x18) mknodat(r0, &(0x7f00000002c0)='./file0\x00', 0x48699d16d6a1911d, 0x9) openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r3 = creat(0x0, 0x0) sendmmsg$inet6(r3, 0x0, 0x0, 0x40) mknodat$null(r3, &(0x7f00000000c0)='./file1\x00', 0x1000, 0x103) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) 18:20:20 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:20:20 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x68, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:20:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:20:20 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:20:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:20:20 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x80, 0x80, 0x39, 0x20, 0x0, 0x200, 0x80014, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x1e800, 0x7, 0x7fff, 0x7, 0x7ff, 0x1000, 0xc32, 0x0, 0xfff, 0x0, 0xffffffff7fffffff}, r0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) 18:20:20 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x28}, 0x80) [ 3460.442386] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3460.550212] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:20:37 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) 18:20:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x100000000000000}) 18:20:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:20:37 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:20:37 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:20:37 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:20:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_io_uring_setup(0x726a, &(0x7f0000000240)={0x0, 0x1697, 0x0, 0x0, 0x27b}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) ioctl$sock_bt_hci(r4, 0x400448e7, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r4, 0x4, 0xdcae, 0x4, 0x1}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x4e1e, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r5, 0x400448dd, &(0x7f0000000380)={0x0, 0x0, "b680db"}) fremovexattr(r5, &(0x7f0000000180)=@known='trusted.overlay.redirect\x00') openat(0xffffffffffffffff, &(0x7f0000000140)='./file1/file0\x00', 0x40402, 0x20) 18:20:37 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x36}, 0x80) 18:20:37 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:20:37 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x60}, 0x80) [ 3477.934393] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3477.944408] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:20:38 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:20:38 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:20:38 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0xfc}, 0x80) 18:20:38 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x480, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:20:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, 0x0) 18:20:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) [ 3478.310181] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:20:38 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x1f4}, 0x80) 18:20:38 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0), &(0x7f00000002c0)={0x0, 0xfb, 0xc2, 0xa, 0x81, "fef38a7d906efb4b3264292e1e3d6623", "0873022bc81fcf848736d0bb29bc88fbdd39f142e45d8ce7875f2218a0b0488007d0a982200f4f2d5e76f9a7ff17269981f956e28d530047fde3c83e105b726e968613eb6413b6f2724e0dd9cfd8ccffcfb3d9fed25c010494024eb570349905616fd733eef2e0231d2b1a0096aca1b15da87983584dc954d28987dbf5f4ecffbc8aa7687af5dddbb5cb7ceaaabd5af15ba6c8390ca8de6dc96c8a036adc89fce45b324c56344371331e509fbd"}, 0xc2, 0x2) 18:20:38 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3478.450241] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:20:38 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:20:38 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x300}, 0x80) 18:20:38 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3478.804447] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3479.006143] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3479.978764] Bluetooth: hci0: command 0x0c1a tx timeout 18:20:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, 0x0) 18:20:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:20:53 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:20:53 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:20:53 executing program 0: r0 = io_uring_setup(0x1cd8, &(0x7f0000001940)={0x0, 0x0, 0x0, 0x2}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='timers\x00') r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r4, 0x400448dd, &(0x7f0000000380)={0x0, 0x0, "b680db"}) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[r1, r0, r2, r0, r0, r3, r4], 0x7) 18:20:53 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x3e8}, 0x80) 18:20:53 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:20:53 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x3f, 0xc1c1}}, './file0\x00'}) fchownat(r1, &(0x7f00000001c0)='./file1/file0\x00', 0xee01, 0xee01, 0x400) fallocate(r0, 0x0, 0x0, 0x8800000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) 18:20:53 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x500}, 0x80) [ 3493.583292] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:20:53 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:20:53 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3493.814163] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:20:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, 0x0) 18:20:53 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x600}, 0x80) 18:20:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:20:54 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:20:54 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1800, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3494.006941] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3494.289025] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3495.595710] Bluetooth: hci0: command 0x0c1a tx timeout [ 3497.642649] Bluetooth: hci0: command 0x0c1a tx timeout 18:21:09 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c00, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:09 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000, 0x2000}) 18:21:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x0, 0x100000000000000}) 18:21:09 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:09 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) link(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file0\x00') 18:21:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8000) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r2, 0x400448dd, &(0x7f0000000380)={0x0, 0x0, "b680db"}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000140)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e7, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x4, 0xdcae, 0x4, 0x1}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) r4 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$BTRFS_IOC_TREE_SEARCH(r4, 0xd0009411, &(0x7f0000000240)={{0x0, 0xff, 0x8, 0x400, 0x9efc, 0x7ff, 0x1, 0x5, 0x20, 0xb56c, 0x4, 0x20, 0x6, 0x7, 0x8}}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:21:09 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x700}, 0x80) 18:21:09 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0xe00}, 0x80) [ 3509.401364] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3509.414727] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:21:09 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:09 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x1100}, 0x80) 18:21:09 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:09 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:09 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x2800}, 0x80) [ 3509.740824] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3509.879072] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3511.338676] Bluetooth: hci0: command 0x0c1a tx timeout 18:21:26 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:26 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6800, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:26 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@mcast2, @in6=@ipv4={""/10, ""/2, @empty}}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f00000008c0)=0xe8) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000900)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01}}, './file2\x00'}) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb357b87ae67d5b00d5a28eea29113393d0e1c7391515c7ab7c00", 0x2d}, 0x48, 0xffffffffffffffff) r5 = getegid() keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000080)='rxrpc_s\x00', &(0x7f0000000300)=@keyring={'key_or_keyring:', r4}) keyctl$chown(0x4, r4, 0xee01, r5) bind$bt_hci(r3, &(0x7f0000000100)={0x1f, 0x0, 0x2}, 0x6) fsetxattr$system_posix_acl(r3, 0x0, &(0x7f0000000140)={{}, {0x1, 0x1}, [{0x2, 0x3, 0xffffffffffffffff}, {0x2, 0x2, 0xffffffffffffffff}], {0x4, 0x6}, [{}, {0x8, 0x0, r5}, {0x8, 0x1}], {0x10, 0x2}, {0x20, 0x7}}, 0x4c, 0x2) fstat(r0, &(0x7f0000000940)) r6 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) 18:21:26 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x3600}, 0x80) 18:21:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, 0x0) 18:21:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x0, 0x100000000000000}) 18:21:26 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:26 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:26 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x4000}, 0x80) 18:21:26 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8004, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3526.660415] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3526.692732] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3526.743535] EXT4-fs (loop0): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:21:26 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x6000}, 0x80) 18:21:26 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:26 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:26 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, 0x0) 18:21:27 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x80fe}, 0x80) 18:21:27 executing program 7: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c1100001f00000828bd7000fedbdf251c000000ff004b80080035000a0101009e36121581d51d1428cf18733927f1b7f2ba5cbd4da70f983ea4050e0d3be3e78138be368a8553b5f3c4f4942517dc31e9795affcbbe20e3bc8dfe35d6d83ed55dbfff832ac63fb2be188ea66b1957b1129d70996a6e40df8fb7d3ee5e267f10f524d6de02a82223415ac226cec52e515f88fb8e1e4b744f75ccbf83e02b6e84534d7624ca2b8739ec3dbb6574c7595ab510d4b0ccec6ab6a7a2063a8e7134017a7fca26433982e7", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB='\x00'], 0x118c}, 0x1, 0x0, 0x0, 0x4044}, 0x4004004) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000001580), 0xeb4, 0x28000) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x129040, 0xc2) openat(r2, &(0x7f00000000c0)='./file1\x00', 0x4002, 0x110) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000014c0), 0x100, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r4, 0x400448dd, &(0x7f0000000380)={0x0, 0x0, "b680db"}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000001500)={{0x1, 0x1, 0x18, r4, {0x7ff}}, './file1\x00'}) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) 18:21:27 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xeffd, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x0, 0x100000000000000}) [ 3527.193791] EXT4-fs (loop6): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3527.248682] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:21:27 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0xc0fe}, 0x80) [ 3527.342615] EXT4-fs (loop0): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:21:27 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:27 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3527.593955] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3529.514712] Bluetooth: hci0: command 0x0c1a tx timeout 18:21:43 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0xe803}, 0x80) 18:21:43 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb3c906d6b66732e666174000208011b46ed5358827100", 0x17}, {0x0, 0x0, 0x1000a00}], 0xc008, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = accept$unix(0xffffffffffffffff, &(0x7f00000002c0)=@abs, &(0x7f00000000c0)=0x6e) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000001c0), 0x402400, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') tee(r1, r3, 0xfffffffffffffbff, 0x1) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r4, 0x14, 0x7, 0x5) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000080", @ANYRES32, @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00./file1\x00']) r6 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000200)={0x7, 0x1fff2893, 0x1000, 0x101, 0x50}) openat2(r0, &(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)={0xa0000, 0x22, 0x4}, 0x18) 18:21:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) 18:21:43 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:43 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, 0x0) 18:21:44 executing program 0: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x80, 0x81, 0x2, 0x0, 0x4, 0x32102, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffff80, 0x2, @perf_config_ext={0xfffffffffffffffe, 0x8}, 0x88a1, 0x1ff, 0x1, 0x4, 0x8, 0x7ff, 0x1df, 0x0, 0x7b, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) 18:21:44 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf000, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:44 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000005, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x81baa7a28d91b4d0, r1) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0xffffffffffffffff) r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x200000a, r2) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, r2) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYBLOB="010000fa0e0d88f38afb786d98a0000000000000000000", @ANYRES32=r0, @ANYBLOB="78748e35f5ea8f3a5c7f0bc5f68126153f4bd23ecc5d75ea6dcb6eb75f7f7a6a8a79a9cf74a3ce57969ad8e11ada80970f4170e853d8041d52da3360534bb2fee8eb13e3c79be79f8972a28d3adee80e95c0cc289c4c3a57f870540de2ccd460f64b11d387a16f42acd14361e8d85db5057ad5da73c0309215a804e00cf4a1a309ac44068bbefed570ac0ed851b80783322aa723b3b4349100e198c5497b83eacfd179e5f70e4dd4a703bab3e3494608be00"/190]) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x26) kcmp(0xffffffffffffffff, 0x0, 0x6, r0, 0xffffffffffffffff) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x4e20, 0x35, @loopback}, 0x1c) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r4, r3, 0x0, 0x9bbb) 18:21:44 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0xf401}, 0x80) [ 3544.134979] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue 18:21:44 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:44 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfdef, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:44 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) creat(&(0x7f00000000c0)='./file1\x00', 0x80) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FICLONE(r1, 0x40049409, r0) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) 18:21:44 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:44 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0xfc00}, 0x80) 18:21:44 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:44 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:44 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0xfe80}, 0x80) 18:21:44 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3544.598266] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3544.907925] EXT4-fs (loop5): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3544.912130] perf: interrupt took too long (7897 > 7855), lowering kernel.perf_event_max_sample_rate to 25000 18:21:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_mount_image$tmpfs(0x0, 0x0, 0x9, 0x0, 0x0, 0x0, &(0x7f00000011c0)=ANY=[@ANYRESHEX=0xee01, @ANYBLOB="000000002753cfd2fd7b10b4cade49980cb058100000000000000000000000000000a1a411564e9a97d32a09a1cdee05a51e7ff9883ea16d9d80c7fbfa75d8cfab9fe5651cdca145a040f4e9c060000039658a70fdaac3136eeaf9f183fec483ef8f9b14bd521369bf2dd0651691b78d982cc5a7b8653577e15fe130007bdf3df588"]) ioctl$INCFS_IOC_PERMIT_FILL(0xffffffffffffffff, 0x40046721, &(0x7f0000001840)) r2 = socket$inet(0xa, 0x3, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x8) r3 = dup(r2) setsockopt$inet6_int(r3, 0x29, 0x16, &(0x7f0000000180), 0x4) r4 = dup(0xffffffffffffffff) setsockopt$inet6_int(r4, 0x29, 0x16, &(0x7f0000000180), 0x4) open$dir(&(0x7f0000000040)='./file0\x00', 0x1, 0x0) openat(r4, &(0x7f00000000c0)='./file1\x00', 0x842, 0x2e) syz_io_uring_complete(0x0) r5 = dup(r1) setsockopt$inet6_int(r5, 0x29, 0x16, &(0x7f0000000180), 0x4) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, r0, 0x80000) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f00000001c0)={{}, 0x0, 0x0, @unused=[0x5, 0x9], @subvolid}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x62220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x80010}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:21:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x0, 0x2000}) 18:21:57 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) (fail_nth: 1) 18:21:57 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:57 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x159503, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) 18:21:57 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:57 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf0ffff, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:57 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0xfec0}, 0x80) 18:21:57 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0xff00}, 0x80) 18:21:57 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3557.266820] EXT4-fs (loop3): mounted filesystem without journal. Opts: delalloc,,errors=continue [ 3557.280269] FAULT_INJECTION: forcing a failure. [ 3557.280269] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3557.282835] CPU: 0 PID: 22608 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 3557.284334] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3557.286094] Call Trace: [ 3557.286661] dump_stack+0x107/0x167 [ 3557.287443] should_fail.cold+0x5/0xa [ 3557.288275] _copy_from_user+0x2e/0x1b0 [ 3557.289135] __ext4_ioctl+0x808/0x4190 [ 3557.289983] ? ext4_reset_inode_seed+0x450/0x450 [ 3557.290993] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3557.292113] ? find_held_lock+0x2c/0x110 [ 3557.293004] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 3557.294227] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 3557.295330] ? do_vfs_ioctl+0x283/0x10d0 [ 3557.296217] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 3557.297341] ? generic_block_fiemap+0x60/0x60 [ 3557.298302] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3557.299346] ? selinux_file_ioctl+0xb6/0x270 [ 3557.300302] ? __ext4_ioctl+0x4190/0x4190 [ 3557.301192] __x64_sys_ioctl+0x19a/0x210 [ 3557.302068] do_syscall_64+0x33/0x40 [ 3557.302866] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3557.303957] RIP: 0033:0x7fd57ac5cb19 [ 3557.304763] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3557.308715] RSP: 002b:00007fd5781d2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3557.310344] RAX: ffffffffffffffda RBX: 00007fd57ad6ff60 RCX: 00007fd57ac5cb19 [ 3557.311869] RDX: 0000000020000140 RSI: 00000000c0185879 RDI: 0000000000000003 [ 3557.313401] RBP: 00007fd5781d21d0 R08: 0000000000000000 R09: 0000000000000000 [ 3557.314924] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3557.316450] R13: 00007ffd542a543f R14: 00007fd5781d2300 R15: 0000000000022000 18:21:57 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffff0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:21:57 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs, 0x80) 18:21:57 executing program 5: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0xa0610, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000003c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xc97}}, './mnt\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000400)=0x5) recvmsg(r0, &(0x7f0000000280)={&(0x7f0000000100)=@rc={0x1f, @none}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000180)=""/157, 0x9d}], 0x1}, 0x2) syz_open_procfs(0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/70, 0x46, 0xfffffffffffffff8) r2 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) mknodat$loop(r2, &(0x7f0000000240)='./mnt\x00', 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r3, &(0x7f0000005080)=[{{&(0x7f0000000000)={0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="2c000010000000000000000007000000441cf781ac14143f000091b37f00040000000000000001010000000700000000fc0d746f1b63680419811e6ac94cb3963bc66bf904ad18597b79915776273165fb3fde2cd697ebe7e7d54a425d5d0c63fe9f34b168c80f8f913b663e5f5c15fccbdddec1bf9780cbb36dc68d8fe3bff526719564"], 0x30}}], 0x1, 0x20000080) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r4, &(0x7f0000000580)=[{&(0x7f0000001380)=""/213, 0xd5}, {&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x3, 0x5545, 0x0) open_tree(r4, &(0x7f00000002c0)='./file0\x00', 0x9100) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000000)) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r5, 0x400448dd, &(0x7f0000000380)={0x0, 0x0, "b680db"}) mknodat$loop(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x80, 0x1) pread64(r5, &(0x7f0000000440)=""/114, 0x72, 0x3) 18:21:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x0, 0x2000}) [ 3559.722675] Bluetooth: hci0: command 0x0c1a tx timeout [ 3561.770672] Bluetooth: hci0: command 0x0c1a tx timeout 18:22:11 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) (fail_nth: 2) 18:22:11 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:22:11 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c667", 0x32, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:22:11 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x0, 0x2}, 0x80) 18:22:11 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba07", 0x62, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503bdf3947f4ed8c9955c27b301b6b75b3a4c48087b96a9113ee8e203e84d2bc94c34e4f27d80ac4b83e6428cd98e", 0xb7, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40a193db00", 0x9b, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000800)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x8800000) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) 18:22:11 executing program 7: recvmmsg$unix(0xffffffffffffffff, &(0x7f00000015c0)=[{{&(0x7f00000002c0), 0x6e, &(0x7f0000000240)=[{&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f00000000c0)=""/17, 0x11}], 0x2, &(0x7f0000000340)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}}, {{&(0x7f0000000440), 0x6e, &(0x7f00000014c0)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001500)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb8}}], 0x2, 0x40000041, &(0x7f0000001640)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SCAN(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000000)={0x1c, r2, 0x301, 0x0, 0x0, {{0x5}, {@val={0xeac}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000001740)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001700)={&(0x7f00000016c0)={0x40, r2, 0x200, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x5b77, 0x5}}}}, [@NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x5}, @NL80211_ATTR_VLAN_ID={0x6, 0x11a, 0x1}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0x7236}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000000}, 0x880) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r3, 0x400448dd, &(0x7f0000000380)={0x0, 0x0, "b680db"}) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r4, 0x400448dd, &(0x7f0000000380)={0x0, 0x0, "b680db"}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e6661740002000000f8670000000000", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESOCT=r3, @ANYRES64, @ANYRES64=r3, @ANYRESDEC=r4]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x8800000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r6, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) 18:22:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x0, 0x2000}) 18:22:11 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$rfkill(r0, &(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1}, 0x8) r1 = syz_open_dev$hidraw(&(0x7f0000000040), 0xea0000000000000, 0x8000) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001100)={0x0, ""/256, 0x0, 0x0}) sync_file_range(0xffffffffffffffff, 0x3, 0x1000, 0x0) r10 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r10, 0x127c, &(0x7f0000000000)) sendfile(0xffffffffffffffff, r10, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000001e00)={r3, r7, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f0000000100)={r7, 0x3}) [ 3571.060916] [ 3571.061291] ====================================================== [ 3571.062553] WARNING: possible circular locking dependency detected [ 3571.063808] 5.10.202 #1 Not tainted [ 3571.064552] ------------------------------------------------------ [ 3571.065823] syz-executor.5/22663 is trying to acquire lock: [ 3571.067061] ffff88800db40b78 ((work_completion)(&hdev->bg_scan_update)){+.+.}-{0:0}, at: __flush_work+0xdd/0xa90 [ 3571.069185] [ 3571.069185] but task is already holding lock: [ 3571.070576] ffffffff856193e8 (rfkill_global_mutex){+.+.}-{3:3}, at: rfkill_fop_write+0xff/0x4b0 [ 3571.072359] [ 3571.072359] which lock already depends on the new lock. [ 3571.072359] [ 3571.074025] [ 3571.074025] the existing dependency chain (in reverse order) is: [ 3571.076010] [ 3571.076010] -> #4 (rfkill_global_mutex){+.+.}-{3:3}: [ 3571.078183] __mutex_lock+0x13d/0x10b0 [ 3571.079072] rfkill_register+0x36/0xa10 [ 3571.079980] hci_register_dev+0x42e/0xc00 [ 3571.080937] __vhci_create_device+0x2c8/0x5c0 [ 3571.081951] vhci_open_timeout+0x38/0x50 [ 3571.082869] process_one_work+0x9a9/0x14b0 [ 3571.083818] worker_thread+0x61d/0x1310 [ 3571.084742] kthread+0x38f/0x470 [ 3571.085534] ret_from_fork+0x22/0x30 [ 3571.086366] [ 3571.086366] -> #3 (&data->open_mutex){+.+.}-{3:3}: [ 3571.087671] __mutex_lock+0x13d/0x10b0 [ 3571.088557] vhci_send_frame+0x63/0xa0 [ 3571.089443] hci_send_frame+0x1b9/0x320 [ 3571.090335] hci_tx_work+0x10af/0x1660 [ 3571.091211] process_one_work+0x9a9/0x14b0 [ 3571.092154] worker_thread+0x61d/0x1310 [ 3571.093055] kthread+0x38f/0x470 [ 3571.093831] ret_from_fork+0x22/0x30 [ 3571.094663] [ 3571.094663] -> #2 ((work_completion)(&hdev->tx_work)){+.+.}-{0:0}: [ 3571.096223] __flush_work+0x105/0xa90 [ 3571.097097] hci_dev_do_close+0x131/0x1240 [ 3571.098038] hci_unregister_dev+0x149/0x430 [ 3571.098998] vhci_release+0x70/0xf0 [ 3571.099824] __fput+0x285/0x980 [ 3571.100589] task_work_run+0xe2/0x1a0 [ 3571.101443] do_exit+0xb6f/0x2600 [ 3571.102231] do_group_exit+0x125/0x310 [ 3571.103105] get_signal+0x4bc/0x22f0 [ 3571.103947] arch_do_signal_or_restart+0x2b7/0x1990 [ 3571.105059] exit_to_user_mode_prepare+0x10f/0x190 [ 3571.106144] syscall_exit_to_user_mode+0x38/0x1e0 [ 3571.107212] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3571.108331] [ 3571.108331] -> #1 (&hdev->req_lock){+.+.}-{3:3}: [ 3571.109602] __mutex_lock+0x13d/0x10b0 [ 3571.110484] bg_scan_update+0x82/0x500 [ 3571.111359] process_one_work+0x9a9/0x14b0 [ 3571.112306] worker_thread+0x61d/0x1310 [ 3571.113209] kthread+0x38f/0x470 [ 3571.113981] ret_from_fork+0x22/0x30 [ 3571.114813] [ 3571.114813] -> #0 ((work_completion)(&hdev->bg_scan_update)){+.+.}-{0:0}: [ 3571.116519] __lock_acquire+0x29e7/0x5b00 [ 3571.117450] lock_acquire+0x197/0x470 [ 3571.118307] __flush_work+0x105/0xa90 [ 3571.119164] __cancel_work_timer+0x368/0x4c0 [ 3571.120143] hci_request_cancel_all+0x73/0x230 [ 3571.121163] hci_dev_do_close+0xd9/0x1240 [ 3571.122091] hci_rfkill_set_block+0x166/0x1a0 [ 3571.123082] rfkill_set_block+0x1fd/0x540 [ 3571.124006] rfkill_fop_write+0x253/0x4b0 [ 3571.124941] vfs_write+0x29a/0xa70 [ 3571.125748] ksys_write+0x1f6/0x260 [ 3571.126577] do_syscall_64+0x33/0x40 [ 3571.127423] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3571.128559] [ 3571.128559] other info that might help us debug this: [ 3571.128559] [ 3571.130150] Chain exists of: [ 3571.130150] (work_completion)(&hdev->bg_scan_update) --> &data->open_mutex --> rfkill_global_mutex [ 3571.130150] [ 3571.132860] Possible unsafe locking scenario: [ 3571.132860] [ 3571.134072] CPU0 CPU1 [ 3571.135007] ---- ---- [ 3571.135940] lock(rfkill_global_mutex); [ 3571.136772] lock(&data->open_mutex); [ 3571.138052] lock(rfkill_global_mutex); [ 3571.139361] lock((work_completion)(&hdev->bg_scan_update)); [ 3571.140557] [ 3571.140557] *** DEADLOCK *** [ 3571.140557] [ 3571.141775] 1 lock held by syz-executor.5/22663: [ 3571.142724] #0: ffffffff856193e8 (rfkill_global_mutex){+.+.}-{3:3}, at: rfkill_fop_write+0xff/0x4b0 [ 3571.144601] [ 3571.144601] stack backtrace: [ 3571.145511] CPU: 1 PID: 22663 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 3571.146901] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3571.148587] Call Trace: [ 3571.149120] dump_stack+0x107/0x167 [ 3571.149862] check_noncircular+0x263/0x2e0 [ 3571.150715] ? register_lock_class+0xbb/0x17b0 [ 3571.151645] ? print_circular_bug+0x470/0x470 [ 3571.152577] ? find_first_zero_bit+0x94/0xb0 [ 3571.153467] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 3571.154378] __lock_acquire+0x29e7/0x5b00 [ 3571.155229] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3571.156294] ? stack_trace_save+0x8c/0xc0 [ 3571.157151] ? mark_lock+0xf5/0x2df0 [ 3571.157904] lock_acquire+0x197/0x470 [ 3571.158668] ? __flush_work+0xdd/0xa90 [ 3571.159454] ? lock_release+0x680/0x680 [ 3571.160309] ? __flush_work+0x78c/0xa90 [ 3571.161144] ? lock_downgrade+0x6d0/0x6d0 [ 3571.161980] __flush_work+0x105/0xa90 [ 3571.162746] ? __flush_work+0xdd/0xa90 [ 3571.163528] ? lock_chain_count+0x20/0x20 [ 3571.164361] ? queue_delayed_work_on+0xe0/0xe0 [ 3571.165301] ? mark_lock+0xf5/0x2df0 [ 3571.166053] ? lock_acquire+0x197/0x470 [ 3571.166849] ? find_held_lock+0x2c/0x110 [ 3571.167667] ? __wake_up_common_lock+0xde/0x140 [ 3571.168607] ? mark_held_locks+0x9e/0xe0 [ 3571.169423] __cancel_work_timer+0x368/0x4c0 [ 3571.170343] ? try_to_grab_pending+0xe0/0xe0 [ 3571.171235] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3571.172292] ? cancel_delayed_work+0x1b8/0x2b0 [ 3571.173226] ? cancel_delayed_work_sync+0x20/0x20 [ 3571.174192] hci_request_cancel_all+0x73/0x230 [ 3571.175104] hci_dev_do_close+0xd9/0x1240 [ 3571.175934] ? rfkill_set_block+0x18f/0x540 [ 3571.176803] ? hci_dev_open+0x350/0x350 [ 3571.177599] ? mark_held_locks+0x9e/0xe0 [ 3571.178414] hci_rfkill_set_block+0x166/0x1a0 [ 3571.179312] ? hci_power_off+0x20/0x20 [ 3571.180091] rfkill_set_block+0x1fd/0x540 [ 3571.180930] rfkill_fop_write+0x253/0x4b0 [ 3571.181760] ? rfkill_sync_work+0xa0/0xa0 [ 3571.182599] ? security_file_permission+0x24e/0x570 [ 3571.183601] ? rfkill_sync_work+0xa0/0xa0 [ 3571.184447] vfs_write+0x29a/0xa70 [ 3571.185160] ksys_write+0x1f6/0x260 [ 3571.185889] ? __ia32_sys_read+0xb0/0xb0 [ 3571.186704] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3571.187752] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3571.188794] do_syscall_64+0x33/0x40 [ 3571.189540] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3571.190569] RIP: 0033:0x7f8f61a96b19 [ 3571.191318] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3571.195046] RSP: 002b:00007f8f5f00c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3571.196591] RAX: ffffffffffffffda RBX: 00007f8f61ba9f60 RCX: 00007f8f61a96b19 [ 3571.198023] RDX: 0000000000000008 RSI: 00000000200000c0 RDI: 0000000000000003 [ 3571.199459] RBP: 00007f8f61af0f6d R08: 0000000000000000 R09: 0000000000000000 [ 3571.200903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3571.202340] R13: 00007ffd19ffb03f R14: 00007f8f5f00c300 R15: 0000000000022000 [ 3571.210381] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.7'. [ 3571.263819] FAULT_INJECTION: forcing a failure. [ 3571.263819] name failslab, interval 1, probability 0, space 0, times 0 [ 3571.266382] CPU: 1 PID: 22677 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 3571.267801] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3571.269496] Call Trace: [ 3571.270043] dump_stack+0x107/0x167 [ 3571.270799] should_fail.cold+0x5/0xa [ 3571.271587] ? mempool_alloc+0x148/0x360 [ 3571.272464] ? mempool_free_pages+0x20/0x20 [ 3571.273353] should_failslab+0x5/0x20 [ 3571.274168] kmem_cache_alloc+0x5b/0x310 [ 3571.275017] ? mempool_free_pages+0x20/0x20 [ 3571.275920] mempool_alloc+0x148/0x360 [ 3571.276745] ? mempool_resize+0x7d0/0x7d0 [ 3571.277620] ? avc_has_perm_noaudit+0x1c9/0x3e0 [ 3571.278598] ? lock_downgrade+0x6d0/0x6d0 [ 3571.279478] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 3571.280577] ? trace_hardirqs_on+0x5b/0x180 [ 3571.281497] bio_alloc_bioset+0x36e/0x600 [ 3571.282374] ? bvec_alloc+0x2f0/0x2f0 [ 3571.283173] ? lock_acquire+0x3ef/0x470 [ 3571.283978] ? find_get_entry+0x29f/0x740 [ 3571.284830] ? lock_downgrade+0x6d0/0x6d0 [ 3571.285678] ? lock_release+0x4d1/0x680 [ 3571.286500] __blkdev_issue_discard+0x402/0x880 [ 3571.287470] ? blkdev_issue_zeroout+0x4c0/0x4c0 [ 3571.288448] ? mb_find_order_for_block+0x19d/0x200 [ 3571.289456] blkdev_issue_discard+0xb7/0x170 [ 3571.290372] ? __blkdev_issue_discard+0x880/0x880 [ 3571.291361] ? lock_release+0x4d1/0x680 [ 3571.292174] ? ext4_trim_fs+0xe69/0x21c0 [ 3571.293016] ? lock_downgrade+0x6d0/0x6d0 [ 3571.293870] ? do_raw_spin_lock+0x260/0x260 [ 3571.294756] ext4_trim_fs+0xfe8/0x21c0 [ 3571.295566] ? ext4_group_add_blocks+0xd40/0xd40 [ 3571.296531] ? lock_downgrade+0x6d0/0x6d0 [ 3571.297388] __ext4_ioctl+0x82c/0x4190 [ 3571.298179] ? _kstrtoull+0x297/0x550 [ 3571.298955] ? ext4_reset_inode_seed+0x450/0x450 [ 3571.299920] ? lock_acquire+0x3ef/0x470 [ 3571.300749] ? get_pid_task+0xea/0x250 [ 3571.301536] ? lock_downgrade+0x6d0/0x6d0 [ 3571.302381] ? lock_release+0x4d1/0x680 [ 3571.303188] ? ksys_write+0x21a/0x260 [ 3571.303961] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 3571.305134] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 3571.306174] ? do_vfs_ioctl+0x283/0x10d0 [ 3571.306998] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 3571.308065] ? generic_block_fiemap+0x60/0x60 [ 3571.308982] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3571.309960] ? selinux_file_ioctl+0xb6/0x270 [ 3571.310847] ? __ext4_ioctl+0x4190/0x4190 [ 3571.311683] __x64_sys_ioctl+0x19a/0x210 [ 3571.312521] do_syscall_64+0x33/0x40 [ 3571.313273] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3571.314302] RIP: 0033:0x7fd57ac5cb19 [ 3571.315053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3571.318760] RSP: 002b:00007fd5781b1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3571.320293] RAX: ffffffffffffffda RBX: 00007fd57ad70020 RCX: 00007fd57ac5cb19 [ 3571.321754] RDX: 0000000020000140 RSI: 00000000c0185879 RDI: 0000000000000007 [ 3571.323191] RBP: 00007fd5781b11d0 R08: 0000000000000000 R09: 0000000000000000 [ 3571.324639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3571.326073] R13: 00007ffd542a543f R14: 00007fd5781b1300 R15: 0000000000022000 18:22:11 executing program 1: r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x3988, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@un=@abs={0x0, 0x3}, 0x80) 18:22:11 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x5c3180, 0x0) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x7fffffff0000000, 0x6, &(0x7f00000006c0)=[{&(0x7f00000002c0)="f5d8903642917e1d4294dcd0961fdae59535ea3753e39dbc4ab539951190e17e5724ff1a19e6080409cbc61d432663e0a796c8e5daddb4c1bff8f89902d07d821c756e4e828e94453a966c15de2efe7ff5a9083175fcdd83524c2fd863e2ab034ffc62cc4cb52a863db7ed02afc10e890765774dbd667e381ea47e4b", 0x7c, 0xf3}, {&(0x7f00000003c0)="0be678730cd59b82ae1aec58c07e48ce0f4982178aa96b6e3773c6d71ccd3585981dc9af8c689e6cbf203e4d9df346d57c716a89ed28f487617196e61463d77e315a78b0c3a36bb7687b6874e54a1d456d80526ff0db70f6f8c7fd3b6b03", 0x5e, 0x1}, {&(0x7f0000000340)="e10004fc0ba9a7716f48cc1f4538e427cc49ebcd282b29fc6b2984345c6cb24c47a5bdd9be6654d341fea78ff35e95f9c6671a", 0x33, 0x8}, {&(0x7f00000004c0)="af63b653dacc249875f44d56d8509b1a21005578153e465141711334cdd247a43a1dab7ea3e85ab2d129c6fc16e97ac8ae9ff287d932b832f009294cba5f71fda5822652547d56b20c4840b1d6437669d7ebe1c8407a3daf117ac57a773cefd0ba", 0x61, 0x1}, {&(0x7f0000000540)="a5f197957fc0fbb88546b272eef23acaed7dadd34cc0081c137882eff8390254820639c2cbf78ea5d563982b3b5ace59d195c9022987ef37478769518572c5efb5469a68cee296ad638d2019a4dcb5e5abd1e62372cfabf53e7167b4dd021ae24a9b8d001079395e5f5ca91fd70daec0b7bbaa18b450833cfe645fa3f4967b73c9814361a83e9d2f2503", 0x8a, 0x10001}, {&(0x7f0000000600)="a825dc7a5788bc1865b31b1a40f32c5341a5bbd5a720bc592dbd341bb6024f51cbeebe81a496c5e0423e70078e136743eec798d6d55e8f4fdfefea93079780d6745a6d104021caad6fc9496d1c7c4b5834280d0c03cd428a4dcb8148de03d169c86c7357dc7d3504fa96cbcf1fd19de5ff86553525984444d05ca050193e098f685b9d2e79764556b680a50dd0d0317646c0296a402e40", 0x97, 0x4f}], 0x202000, &(0x7f0000000780)={[{@map_normal}, {@session={'session', 0x3d, 0x32}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, '!}h$]/'}}]}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x12, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@delalloc}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200), 0x3) [ 3571.394538] FAT-fs (loop7): Unrecognized mount option "ÿÿ00000000000000000000005ÿÿÿÿÿÿÿÿ" or missing value [ 3571.907327] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.7'. [ 3571.963709] FAT-fs (loop7): Unrecognized mount option "ÿÿ00000000000000000000005ÿÿÿÿÿÿÿÿ" or missing value VM DIAGNOSIS: 18:22:11 Registers: info registers vcpu 0 RAX=ffffffff816fda10 RBX=0000000000000000 RCX=ffffffff8141acec RDX=ffffffffffffffff RSI=ffffffff8141e7f4 RDI=ffff888016f7ff58 RBP=ffff888016f7ff58 RSP=ffff888016f7ff48 R8 =0000000000000000 R9 =0000000000000000 R10=000000007fff0000 R11=0000000000000001 R12=0000000000000000 R13=0000000000000000 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff83e4097e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f767a8ff8c0 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055918215da38 CR3=000000000eb90000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00006b636f6c622f7665642f7379732f XMM02=ffff0000000000000000000000000000 XMM03=00000000000000ff000000ff000000ff XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=00000000000000000000000000000000 XMM06=000055918214f4c0ffffffff00000003 XMM07=00000000000000000000000000000000 XMM08=6e753c007325732575253a5d73255b00 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000030 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822ca621 RDI=ffffffff879e81e0 RBP=ffffffff879e81a0 RSP=ffff888038c0f1e0 R8 =0000000000000001 R9 =0000000000000003 R10=0000000000000000 R11=0000000000000001 R12=0000000000000030 R13=0000000000000030 R14=ffffffff879e81a0 R15=dffffc0000000000 RIP=ffffffff822ca678 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f8f5f00c700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2dc27000 CR3=000000004b36e000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000