0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 57) 10:20:59 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x4000, 0x0) 10:20:59 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xfffffffe, 0x0) 10:20:59 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xfffffffe, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:20:59 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000002c0)={0x85, 0x3f, 0x7, "6b2a43b1c288097aa78d3f3db27aabd72686aad5cbada287c820fefa9f294464dbd0fb5510e88d23a352ec1b242b5b437e1f4ae44b70127e80639c5e41d1b34c7fee6c4f52ac750fb603cd3417e1974b5ca4b52b944ac5f9c81e156d69233958ca3f01817f3f7e56cdb55c33c05cec8cedfa5b4198614c66bba692653720357ac7a6134199"}) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000001200)=ANY=[@ANYBLOB="000000000000000094e3c2bac22f2df16fcd70"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0xf0, 0x4039, 0x100, 0x70bd2b, 0x25dfdbfe, {0x1a}, [@nested={0xdb, 0xb, 0x0, 0x1, [@generic="3b64a00fca10ad54c8289da9ccd7619d4167f47292268ae76a46d7f23afdf06f0b617f3447fd68aa9f9d8856f94068438f89bf7eba6785a0d26d4b1baaccaf037f", @generic="f3e1691c3bef47d024128e555cb8692cdc2a6b649cc8d2681930e282960a7a815f620ba38774217a937f13d978eac8a4ec0bf0e9f34eddde53a3106c373a8e2578fe802c03448626eb4a8d9f53f84b645a1e05f2530527e8562ed758b461feecb50ad704f4275ca3c7c1df281d49282b084b7fd5ebd7b0b8a7825a6d9ceac33eddc20b6cfca5e2076788ba555775dec5d4496184008b"]}]}, 0xf0}, 0x1, 0x0, 0x0, 0x20004000}, 0x1) [ 2739.924151] FAULT_INJECTION: forcing a failure. [ 2739.924151] name failslab, interval 1, probability 0, space 0, times 0 [ 2739.926977] CPU: 1 PID: 59582 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2739.928412] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2739.930176] Call Trace: [ 2739.930775] dump_stack+0x107/0x167 [ 2739.931537] should_fail.cold+0x5/0xa [ 2739.932324] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2739.933373] should_failslab+0x5/0x20 [ 2739.934178] kmem_cache_alloc_trace+0x55/0x320 [ 2739.935149] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2739.936177] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2739.937217] __list_lru_init+0x44d/0x890 [ 2739.938055] alloc_super+0x8b8/0xa90 [ 2739.938854] ? fput+0x20/0x20 [ 2739.939494] sget_fc+0x13e/0x750 [ 2739.940195] ? set_anon_super+0xc0/0xc0 [ 2739.941029] ? rpc_kill_sb+0x1b0/0x1b0 [ 2739.941837] get_tree_keyed+0x55/0x210 [ 2739.942674] vfs_get_tree+0x8e/0x300 [ 2739.943462] path_mount+0x13be/0x20b0 [ 2739.944259] ? strncpy_from_user+0x9e/0x470 [ 2739.945157] ? finish_automount+0xa90/0xa90 [ 2739.946041] ? getname_flags.part.0+0x1dd/0x4f0 [ 2739.947024] __x64_sys_mount+0x282/0x300 [ 2739.947875] ? copy_mnt_ns+0xa00/0xa00 [ 2739.948699] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2739.949799] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2739.950884] do_syscall_64+0x33/0x40 [ 2739.951658] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2739.952730] RIP: 0033:0x7f508b208b19 [ 2739.953491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2739.957566] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2739.959161] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2739.960614] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2739.962113] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2739.963589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2739.965086] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:21:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:21:14 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xc0ed0000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:21:14 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x4002, 0x0) 10:21:14 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c74653200000000fcc45078a79137ef2106816ef6623d50f45befff03000000894cf1ea91829da8ae8c3a2e30402ed02050fbb13ab10a5a5b364ea8afb596007b6627c9163c45057547b673018b7b027b9c186961fd3b58a5a5e3b1076f7946f90648fd254c575450356dbfc8eca6f8148d17a0d36c92fa75b105c893"], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:21:14 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20c0400, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x4000010, 0xffffffffffffffff, 0x8000000) syz_io_uring_setup(0x762, &(0x7f0000000000)={0x0, 0xf65e, 0x4, 0x3, 0x1bd}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f00000004c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x3, 0x6000, @fd_index=0xa, 0x1, &(0x7f0000000440)=[{&(0x7f0000000140)=""/209, 0xd1}, {&(0x7f0000000240)=""/58, 0x3a}, {&(0x7f0000000280)=""/12, 0xc}, {&(0x7f00000002c0)=""/234, 0xea}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/70, 0x46}], 0x6, 0x19, 0x1}, 0x80000000) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000140)={0x18}}, 0x10001) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:21:14 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xedc000000000, 0x0) 10:21:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 58) 10:21:14 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xedc000000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2754.107075] FAULT_INJECTION: forcing a failure. [ 2754.107075] name failslab, interval 1, probability 0, space 0, times 0 [ 2754.110885] CPU: 0 PID: 59822 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2754.112341] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2754.114048] Call Trace: [ 2754.114615] dump_stack+0x107/0x167 [ 2754.115375] should_fail.cold+0x5/0xa [ 2754.116175] ? create_object.isra.0+0x3a/0xa20 [ 2754.117133] should_failslab+0x5/0x20 [ 2754.117924] kmem_cache_alloc+0x5b/0x310 [ 2754.118786] ? mark_held_locks+0x9e/0xe0 [ 2754.119622] create_object.isra.0+0x3a/0xa20 [ 2754.120531] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2754.121596] kmem_cache_alloc_trace+0x151/0x320 [ 2754.122570] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2754.123588] __list_lru_init+0x44d/0x890 [ 2754.124432] alloc_super+0x8b8/0xa90 [ 2754.125208] ? fput+0x20/0x20 [ 2754.125865] sget_fc+0x13e/0x750 [ 2754.126581] ? set_anon_super+0xc0/0xc0 [ 2754.127405] ? rpc_kill_sb+0x1b0/0x1b0 [ 2754.128212] get_tree_keyed+0x55/0x210 [ 2754.129011] vfs_get_tree+0x8e/0x300 [ 2754.129789] path_mount+0x13be/0x20b0 [ 2754.130593] ? strncpy_from_user+0x9e/0x470 [ 2754.131495] ? finish_automount+0xa90/0xa90 [ 2754.132376] ? getname_flags.part.0+0x1dd/0x4f0 [ 2754.133347] __x64_sys_mount+0x282/0x300 [ 2754.134176] ? copy_mnt_ns+0xa00/0xa00 [ 2754.134999] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2754.136063] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2754.137131] do_syscall_64+0x33/0x40 [ 2754.137893] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2754.138948] RIP: 0033:0x7f508b208b19 [ 2754.139710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2754.143514] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2754.145083] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2754.146582] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2754.148029] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2754.149506] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2754.150994] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:21:14 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xe9030000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:21:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x40001000, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) mount$bind(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x1208430, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000140)={0xc, 0x80, 0xa1, 0x7, 0xa9, 0x2, 0x0, 0x1ff, 0x694, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x6, @perf_config_ext={0x3, 0x8}, 0x1000, 0x9, 0x3, 0xe, 0x7ff, 0x400, 0xff81, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, r0, 0x6, 0xffffffffffffffff, 0x8) 10:21:27 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x4000000000000, 0x0) 10:21:27 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r3 = fork() perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x1, 0x1, 0x13, 0x5, 0x0, 0x1000, 0x422, 0xc, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2520, 0x1, @perf_config_ext={0x5, 0x100}, 0x40a55, 0xc23c, 0x80000001, 0x6, 0xfffffffffffffffb, 0x90, 0xffff, 0x0, 0x20000000}, r3, 0x9, r2, 0x18) r4 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r5 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r4, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) readv(r5, &(0x7f0000000080)=[{&(0x7f0000000040)=""/60, 0x3c}, {&(0x7f0000000100)=""/68, 0x44}, {&(0x7f0000000500)=""/238, 0xee}], 0x3) 10:21:27 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xf0ffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:21:27 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000c40)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0/../file0\x00'}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000c80)='./file0\x00', 0x400000, 0x50) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000cc0)={0x2}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {r5, r6}}, './file0\x00'}) stat(&(0x7f0000000180)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r7, 0x0) syz_mount_image$tmpfs(&(0x7f0000000a00), &(0x7f0000000a40)='./file0\x00', 0x401, 0x1, &(0x7f0000000b40)=[{&(0x7f0000000a80)="7b7b51570e77676a18ae6f3052b25342d17fc6e4de5a72a2011752926d1c717d3634045dd9ddd3308198480a9c844d9723ece2b186ad0bed04217c9f35b2c8b110b110a41ac10584a86dccf5d14e94b0130115debdf1e03b2d60ecca9b2e692dcc096d923406f714128897280ed684a9fee5b840548633c47f19f790b21dffa69274884e3a861a", 0x87, 0x8000}], 0x1850, &(0x7f0000000b80)={[{}, {@huge_never}, {@huge_always}, {@mode={'mode', 0x3d, 0x80}}, {@size={'size', 0x3d, [0x25, 0x5d, 0x36, 0x37, 0x37, 0x35, 0x6b, 0x67]}}, {@gid={'gid', 0x3d, r6}}, {@huge_never}, {@huge_always}], [{@uid_gt={'uid>', r7}}, {@smackfsdef={'smackfsdef', 0x3d, 'pipefs\x00'}}]}) mount$bind(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0), 0x400, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x3482, 0xa, &(0x7f0000000780)=[{&(0x7f0000000100)="86579ca5854f2410318f244932abf4e4b83ec09f667a35c122d8d53a1ab6f160692e62292254fe7e6ee011a8e4714033802820e31ad2fc0230ec690169c767a296eca73191d336e19423f28a447916c74a6816f8ee01dc03fc6d1518d7c2c37bf88405c1734a9991a54d59d72122b2d017e044cbb7b51ed728ba3ada09b88ebde1fb8c2786a8a0c15b64370d248f8c4467fa50405df39aacf420af722b91103fd93862483c66c15b9b793ebc6749311233", 0xb1, 0x4}, {&(0x7f0000000240)="542a388baaf5f82c14c43af8b8cf9ec0d1b4df54f2afb91e12bf3b6ef66c69d5d2f998800a6d226ea2668a7a18760f7cc42e716d81d623baf198fc33a0d562929c", 0x41, 0x4}, {&(0x7f00000001c0)="f1df7bea43d782e7e57e7d1b67d86558d3d54e983bebf6e9abe3934ffffaadb5c828924e8393c2b1d0097b", 0x2b, 0x92}, {&(0x7f00000002c0)="5bb15d1eb0c2f20e0113a51653b65778baab46dd6af13aa56783ec71d880cb63f06ae4918b16af8a3d8f8be4e3dce32095bc2ca5abf4dd85e9e19c17ff33bd63fd385b4905467c0d7bd43008ae2a5762b325b93a969d51e19d10d92104e210a6933546c3acf0fa10129db7fd732b9e7a989b6e62979987cfbd009c1ffaaacd4ae3c9bbaf8e4391783df1954495488b48bf2245c1571c5a1e0b", 0x99, 0xffffffff}, {&(0x7f0000000380)="ce27cabd92eea5cf816f4ac67fc251785323ec83e5e25c95ab35e0a5c66c4047463e8c1c5a562a9631f2c81b935f5d1420a1c9a56f3c70e7332b0a58eff44b9fee7d20bbaa4b8d04b4a31d73a3a9312f926f62921485e705145bebbc4feaa99bd6ebc52b4cc326ad2238a077f163e6faaa8b773be1450bdbc21a6bc9b93c2cc4fe17aa5ea0823e0d3473c9752551b2157b1621af60e135317344", 0x9a, 0x6}, {&(0x7f0000000440)="4f7e802ff83cda420645615ddfb7fcb6ca2917ee607ebb08b131cf0e7135b027e926ff9fbba804b26f0eab13a27ac917dae79f7b3f89296501658a238d7c749f6acfacb25e92807c94a4006c41957c5b61fde71ab39aefc1ac24d91342fdddfa6d7c92f764d6995bc64504f07ebab35c2a8c01cab67d3114e9699b06dcb5", 0x7e, 0x2}, {&(0x7f00000004c0)="746cd5846e43ed03d302a3e2b7cbd9c1", 0x10, 0x6}, {&(0x7f0000000500)="6c38845574cc01311932691347f04550a7c3ea5fbf32ff0f9dfb4722c76358e299159b056469fa121ff30a73b6c176376760b9189b193698ce9a496813d19dab9139488c47ec5a3b39ffab07b4f9e7b4fc13aface395277a085ba4660848170e613ca9ff26f9b4ff60dbe2e63c6db5f2ffdd5d7c4f59faa38dcc0ec0b2cf7ffbb891151a678d1b25ef7424d25c678847c81d7b8d91db61a5063e95768af0da0e040d5f5ba2f19629b8ce150d48de49aab94aa9194a5eac329b402f987bc861636a79f0c560a779f49587", 0xca, 0x101}, {&(0x7f0000000600)="17900bcd739574afbb5fa956aa84b30077081b8611dc53352f881408159f77234ebce0cb6bb311108cd02f3b8ed0cd8eb23125494316b2359f3eac890f8a8e7d46ac9126203cb817b38b11e85663429211297dc4eeb46d7db66d8de21b331268bef1e74edd6eb59e40545b88e377aea7f7a5b7738dc264cb3b312f64fc08a559ea56ec5c96ac2032d6120de9db009c022ccc9e4073070c0f47837becc03f90ce1861b90e39e765f03ed2f9bc9f9b9bb448427aa5bdc9", 0xb6, 0x87}, {&(0x7f00000006c0)="3ca092a36e6030cb363e3e2520c5738d1b9237f07ce3e314730940ff162bc11988757c5252785fea42592fec5a944584c8f898ca8ea46e758235dedd25411a6630bbee7795d97351907b293fe5ed71768fa03e8fab891c9a261fca0bbdf8254dcbda5ea796c59b06b936951238969213168d1e699229fe348da531d09b7d234d28f0af1940fcde0674e1c418bfcb0d6789ebc23f888bf7d614def88f016610179ebd9d2b477a6ce68166200894bfd02037b0", 0xb2, 0x7d5}], 0x11420, &(0x7f0000000880)={[{@huge_never}, {@huge_never}], [{@appraise}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x11}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@fsname={'fsname', 0x3d, 'rpc_pipefs\x00'}}, {@smackfshat}]}) 10:21:27 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x7503, 0x0) 10:21:27 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 59) 10:21:27 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x4000000000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:21:27 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0x1, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) sendto$packet(r0, &(0x7f0000000600)="dab20f7f85b77c12e9b47e3faf45c768c72b30dfe0a67d5b7a087ad569eed1ad93cf6724c5f2b7008219311c196e8435496f7f2ba707e311baa718adff1616f335c1a9dc6a872508e4b4fdd9412e9274e77d1836fb092cb495c2a3ca6bfea08ca6ff7809832a9a9d9cde3928a2ea", 0x6e, 0x24008002, &(0x7f0000000340)={0x11, 0x8, 0x0, 0x1, 0xb3, 0x6, @local}, 0x14) mount$9p_unix(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000100), 0x2802040, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c76657273696f6e3d3970323030302e4c2c76657273696f6e3d3970323030302e752c706f73697861636c2c63616368653d667363616368652c667363616368652c756e616d60c57270635f706970656673002c6e6f6465766d61702c63616368657461673d7270635f706970656673002c756e616d653d7270635f706970656673002c70726976706f72742c66736d616769633d3078303030303030303030303030303030362c61756469742c61707072616973652c6f626a5f747970653d5e272a5b2523b7982d2c646f6e745f6d6561737572652c00"]) mount$bind(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000300), 0x8000, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:21:27 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) [ 2767.747887] FAULT_INJECTION: forcing a failure. [ 2767.747887] name failslab, interval 1, probability 0, space 0, times 0 [ 2767.749810] CPU: 1 PID: 60257 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2767.750620] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2767.751570] Call Trace: [ 2767.751885] dump_stack+0x107/0x167 [ 2767.752319] should_fail.cold+0x5/0xa [ 2767.752748] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2767.753320] should_failslab+0x5/0x20 [ 2767.753791] kmem_cache_alloc_trace+0x55/0x320 [ 2767.754316] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2767.754890] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2767.755448] __list_lru_init+0x44d/0x890 [ 2767.755902] alloc_super+0x8b8/0xa90 [ 2767.756331] ? fput+0x20/0x20 [ 2767.756685] sget_fc+0x13e/0x750 [ 2767.757063] ? set_anon_super+0xc0/0xc0 [ 2767.757513] ? rpc_kill_sb+0x1b0/0x1b0 [ 2767.757956] get_tree_keyed+0x55/0x210 [ 2767.758392] vfs_get_tree+0x8e/0x300 [ 2767.758843] path_mount+0x13be/0x20b0 [ 2767.759303] ? strncpy_from_user+0x9e/0x470 [ 2767.759819] ? finish_automount+0xa90/0xa90 [ 2767.760335] ? getname_flags.part.0+0x1dd/0x4f0 [ 2767.760890] __x64_sys_mount+0x282/0x300 [ 2767.761367] ? copy_mnt_ns+0xa00/0xa00 [ 2767.761832] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2767.762436] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2767.763065] do_syscall_64+0x33/0x40 [ 2767.763506] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2767.764107] RIP: 0033:0x7f508b208b19 [ 2767.764542] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2767.766660] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2767.767560] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2767.768373] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2767.769190] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2767.770028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2767.770912] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:21:27 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 60) [ 2767.874336] FAULT_INJECTION: forcing a failure. [ 2767.874336] name failslab, interval 1, probability 0, space 0, times 0 [ 2767.875955] CPU: 1 PID: 60493 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2767.876720] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2767.877621] Call Trace: [ 2767.877913] dump_stack+0x107/0x167 [ 2767.878320] should_fail.cold+0x5/0xa [ 2767.878747] ? create_object.isra.0+0x3a/0xa20 [ 2767.879248] should_failslab+0x5/0x20 [ 2767.879663] kmem_cache_alloc+0x5b/0x310 [ 2767.880110] ? mark_held_locks+0x9e/0xe0 [ 2767.880561] create_object.isra.0+0x3a/0xa20 [ 2767.881055] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2767.881619] kmem_cache_alloc_trace+0x151/0x320 [ 2767.882132] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2767.882675] __list_lru_init+0x44d/0x890 [ 2767.883141] alloc_super+0x8b8/0xa90 [ 2767.883560] ? fput+0x20/0x20 [ 2767.883905] sget_fc+0x13e/0x750 [ 2767.884276] ? set_anon_super+0xc0/0xc0 [ 2767.884722] ? rpc_kill_sb+0x1b0/0x1b0 [ 2767.885153] get_tree_keyed+0x55/0x210 [ 2767.885583] vfs_get_tree+0x8e/0x300 [ 2767.885996] path_mount+0x13be/0x20b0 [ 2767.886418] ? strncpy_from_user+0x9e/0x470 [ 2767.886906] ? finish_automount+0xa90/0xa90 [ 2767.887380] ? getname_flags.part.0+0x1dd/0x4f0 [ 2767.887897] __x64_sys_mount+0x282/0x300 [ 2767.888350] ? copy_mnt_ns+0xa00/0xa00 [ 2767.888783] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2767.889358] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2767.889923] do_syscall_64+0x33/0x40 [ 2767.890333] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2767.890899] RIP: 0033:0x7f508b208b19 [ 2767.891311] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2767.893315] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2767.894159] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2767.894952] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2767.895740] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2767.896517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2767.897294] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:21:27 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xf6ffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:21:28 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x8f00, 0x0) 10:21:28 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x8000000000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:21:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {r0}}, './file0\x00'}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='children\x00') ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r3, {0x3}}, './file0\x00'}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:21:28 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x8000000000000, 0x0) 10:21:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 61) 10:21:28 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000840)=ANY=[@ANYBLOB="00000000006fd259cda63904008d4786c233e13930dea945173cfd47b411fa2d6fe57dfb81969e58f3b8c958a813d7ed8313a8cceb7b0f0d98f21d02ddf91ad3dd0d3bb7f0668a25411e31d64f2191f236eb38a3d0838ffb5f919d9f0ac2e4e74c7197ca03d5c2504f76256a3bc29f195bb3a3c9df6f7a975e95"], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r0, 0x80049363, &(0x7f00000002c0)) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0xffffffffffffff3a, 0x0, 0x64, 0x0) mount(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x40, 0x0) r4 = clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x28, r5, 0x3ddc8cfb493e3995, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5}]}, 0x28}}, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000940)}}, {{&(0x7f0000000980)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x35}}, 0x10, &(0x7f00000009c0)=[{&(0x7f0000000b40)="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", 0x1000}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="800000000000000000000000070000008644000000000005c5da08060b6ffbd2d1fdae866fee0004ced8000789a948278b0612ce400cdf8645b49d711b8623e7b652be06112e9a0b8dc35232bf2acc3baf45a6c0072bd700000000ac1414aae0000001ac14142a64010102e00000027f000001ac1e0101ac1e0001ac1e0101001c010000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac1414aae00000020000000014000000000000000000000002000000e36d000000000000140000000000000000000000010000003713ffff00000000110000000000000000000000010000000400000000000000"], 0xe8}}, {{&(0x7f0000000a40)={0x2, 0x4e22, @rand_addr=0x64010100}, 0x10, &(0x7f0000001d40)=[{&(0x7f0000001e00)="d4eaffa3ed8d66abb3c723a8ce2e3ec19be1ccc09cccdfde83b2a137b83eddcbb271853877460800007f2a1ec5d6bb64bfa74a434909dbb72d13960faff8810f3f7c1f0550", 0x45}, {&(0x7f0000000a80)}, {&(0x7f0000001e80)="27e4edc45789437cf2488cd050be0c1d6daaf8ad5464a1567cce5ee3ec1686714c6dec456bcc10b9328d29ade7af633a62484cc68f2c52c471c970f775851c17597c3b6ac4dd83a0e976ed59e4f3bb59fcc40007cb210b72d49b47313d44151950940b2d83ffa2f3a50432e4f624ffad23668abd246e1da2d0d72be8f4ecaf711dc1dcf6e7a2741cfc00cd4b309ac35b8478ba93e773e9a6fe5c3019c555e97c942d75e2eddf1d", 0xa7}], 0x3, &(0x7f0000001b40)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ra={0x94, 0x4, 0x2}, @timestamp_prespec={0x44, 0x3c, 0xca, 0x3, 0x0, [{@broadcast, 0xea}, {@broadcast}, {@rand_addr=0x64010100, 0x4}, {@rand_addr=0x64010101, 0x80000000}, {@local, 0x40}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x267}, {@dev={0xac, 0x14, 0x14, 0x39}, 0x1f}]}, @generic={0x7, 0x12, "f92e057c5fc2a35af6b85c8da38799a2"}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @local}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@ssrr={0x89, 0xb, 0x3e, [@loopback, @multicast2]}, @timestamp_prespec={0x44, 0x14, 0x83, 0x3, 0x2, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x9}, {@loopback, 0x4000}]}, @cipso={0x86, 0x1f, 0x3, [{0x6, 0x12, "9296750742131ee2f262b0fa335e4317"}, {0x0, 0x7, "286c53a373"}]}]}}}, @ip_tos_u8={{0x11}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}}}}], 0x160}}, {{&(0x7f0000002140)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000002440)=[{&(0x7f0000002180)="edc51d143660688c0efeafc80c94adaef6579c4982b13bdc692c71f84fe50be3e00bb80e456bda8350b53e73b21fb514a88ca330520d49fb13d698757fe7c5246ee904b960a0cda836fe6e138d46a1a90026047485bd70b236dce5c1164bb10753634374888e0d85d2d1e794f9d1fe65461bd8a74f6588eec368eef8aacff204894b7b41d80b0ec319d1ea4fd35e7bdeeb81682e893d4bc24420daaf5bfb70d951dade53feca4a5fa8653cd354750637b279723a14b295b7a930510cc38b0d3787562e2981ca095af0c6738c90361f52", 0xd0}, {&(0x7f0000002280)="663e0b2f78a627cda4f4484950561c1f76f85128bb011bbe331e911cd1de69227b575545cda606671a63ee302b201ae28bd15c9d2361228cf419cddb226003861d52d40ac0a9df88dc33a55790db306e4d9dcb1eb501c3bd0c7dd3a376d4e67d242467ff1fff5baea2e89231f62957e9469b85190e69c3c6b736f25ac1a41e3949743b2dff97eb056680c1ef255e3813ed1d164e9ce7b0c3f2e2a0329c14dd35a33315a267c46a47fb1ec964af13c0147ddb450a5b3dd9a2aa2c127c4f9e1623ee2eb75b9e31f7349e46a27071c58e4f04df9d3f49857aac546853603f856ae6eb8ad9c356a48500", 0xe8}, {&(0x7f0000002380)}, {&(0x7f00000023c0)="0404321548454f672af1b00e9d164118183cdab9aefd333d23485067f8aebedafe25409812c85eb5f890c86db0ad4d15e4510cb5655448fbc69ffc871951d9a3af516a0001fb8c32ae2873f7c2", 0x4d}], 0x4}}], 0x4, 0x80) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x2, 0x7, 0x81, 0x0, 0xfffffffffffffff8, 0x40, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffffff01, 0x4, @perf_bp={&(0x7f0000000080), 0xc}, 0x20, 0x2, 0x9, 0x6, 0x7, 0x4, 0xb15d, 0x0, 0x6, 0x0, 0x5}, r4, 0xe, r3, 0x2) [ 2768.129154] FAULT_INJECTION: forcing a failure. [ 2768.129154] name failslab, interval 1, probability 0, space 0, times 0 [ 2768.131655] CPU: 0 PID: 60787 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2768.133082] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2768.134801] Call Trace: [ 2768.135354] dump_stack+0x107/0x167 [ 2768.136109] should_fail.cold+0x5/0xa [ 2768.136901] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2768.137933] should_failslab+0x5/0x20 [ 2768.138733] kmem_cache_alloc_trace+0x55/0x320 [ 2768.139657] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2768.140697] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2768.141704] __list_lru_init+0x44d/0x890 [ 2768.142536] alloc_super+0x8b8/0xa90 [ 2768.143318] ? fput+0x20/0x20 [ 2768.143950] sget_fc+0x13e/0x750 [ 2768.144641] ? set_anon_super+0xc0/0xc0 [ 2768.145446] ? rpc_kill_sb+0x1b0/0x1b0 [ 2768.146234] get_tree_keyed+0x55/0x210 [ 2768.147031] vfs_get_tree+0x8e/0x300 [ 2768.147795] path_mount+0x13be/0x20b0 [ 2768.148571] ? strncpy_from_user+0x9e/0x470 [ 2768.149455] ? finish_automount+0xa90/0xa90 [ 2768.150327] ? getname_flags.part.0+0x1dd/0x4f0 [ 2768.151292] __x64_sys_mount+0x282/0x300 [ 2768.152114] ? copy_mnt_ns+0xa00/0xa00 [ 2768.152918] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2768.153976] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2768.155043] do_syscall_64+0x33/0x40 [ 2768.155804] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2768.156846] RIP: 0033:0x7f508b208b19 [ 2768.157601] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2768.161331] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2768.162876] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2768.164319] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2768.165756] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2768.167204] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2768.168634] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:21:42 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="12000000005f23b8df2a"], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e22, 0x2, @local, 0x7}}, 0x0, 0x0, 0x32, 0x0, "6bf7894b580230c5c42a095e15aaca860232fc734c1d4b96556506af1fb87b0853cbdb9c8c1c9db0fafc105e911fae39ffa35ef08f466497ccab7de282700df55c2e0a47f7bb97a3ddd4fdb3aede2336"}, 0xd8) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:21:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xfeffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:21:42 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xf0ffff00000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:21:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 62) 10:21:42 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xf0ffffffffffff, 0x0) 10:21:42 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x9a02, 0x0) 10:21:42 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0x9, 0x100) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:21:42 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f0000000b40)={{0x0, 0x9, 0x57, 0x0, 0x7ff, 0x80000001, 0x0, 0x6, 0x3ff, 0x4, 0x652, 0x3, 0x6, 0x0, 0x100}}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2782.624925] FAULT_INJECTION: forcing a failure. [ 2782.624925] name failslab, interval 1, probability 0, space 0, times 0 [ 2782.627947] CPU: 0 PID: 61014 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2782.629354] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2782.631055] Call Trace: [ 2782.631593] dump_stack+0x107/0x167 [ 2782.632335] should_fail.cold+0x5/0xa [ 2782.633106] ? create_object.isra.0+0x3a/0xa20 [ 2782.634026] should_failslab+0x5/0x20 [ 2782.634791] kmem_cache_alloc+0x5b/0x310 [ 2782.635619] ? mark_held_locks+0x9e/0xe0 [ 2782.636440] create_object.isra.0+0x3a/0xa20 [ 2782.637326] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2782.638352] kmem_cache_alloc_trace+0x151/0x320 [ 2782.639303] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2782.640294] __list_lru_init+0x44d/0x890 [ 2782.641124] alloc_super+0x8b8/0xa90 [ 2782.641871] ? fput+0x20/0x20 [ 2782.642505] sget_fc+0x13e/0x750 [ 2782.643201] ? set_anon_super+0xc0/0xc0 [ 2782.644000] ? rpc_kill_sb+0x1b0/0x1b0 [ 2782.644773] get_tree_keyed+0x55/0x210 [ 2782.645549] vfs_get_tree+0x8e/0x300 [ 2782.646293] path_mount+0x13be/0x20b0 [ 2782.647069] ? strncpy_from_user+0x9e/0x470 [ 2782.647932] ? finish_automount+0xa90/0xa90 [ 2782.648791] ? getname_flags.part.0+0x1dd/0x4f0 [ 2782.649730] __x64_sys_mount+0x282/0x300 [ 2782.650544] ? copy_mnt_ns+0xa00/0xa00 [ 2782.651333] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2782.652386] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2782.653430] do_syscall_64+0x33/0x40 [ 2782.654175] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2782.655214] RIP: 0033:0x7f508b208b19 [ 2782.655967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2782.659651] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2782.661174] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2782.662604] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2782.664048] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2782.665490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2782.666938] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:21:42 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xa502, 0x0) 10:21:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xff030000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:21:42 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) open(&(0x7f0000000040)='./file1\x00', 0x20002, 0x80) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x93, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000140)="b24d4d615038fa4bb31dc6acd3ff81f9b9f917c7253dfde3e94774c8be013d", 0x1f, 0x40}], 0x20048, &(0x7f0000000500)={[{@utf8}, {@uni_xlateno}, {@uni_xlate}, {@iocharset={'iocharset', 0x3d, 'cp869'}}, {@shortname_win95}, {@fat=@codepage={'codepage', 0x3d, '737'}}], [{@obj_role={'obj_role', 0x3d, 'rpc_pipefs\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'rpc_pipefs\x00'}}, {@dont_appraise}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}]}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:21:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 63) 10:21:42 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xb903, 0x0) 10:21:42 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x10402, 0x0) dup2(r0, r1) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) unlinkat(r2, &(0x7f0000000040)='./file0\x00', 0x200) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:21:42 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x100000000000000, 0x0) 10:21:42 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) syz_open_dev$vcsa(&(0x7f0000000040), 0x4a4, 0x280301) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:21:43 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xe903, 0x0) [ 2782.937879] FAULT_INJECTION: forcing a failure. [ 2782.937879] name failslab, interval 1, probability 0, space 0, times 0 [ 2782.939793] CPU: 1 PID: 61438 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2782.940557] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2782.941441] Call Trace: [ 2782.941736] dump_stack+0x107/0x167 [ 2782.942144] should_fail.cold+0x5/0xa [ 2782.942559] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2782.943120] should_failslab+0x5/0x20 [ 2782.943551] kmem_cache_alloc_trace+0x55/0x320 [ 2782.944059] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2782.944614] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2782.945145] __list_lru_init+0x44d/0x890 [ 2782.945599] alloc_super+0x8b8/0xa90 [ 2782.946015] ? fput+0x20/0x20 [ 2782.946361] sget_fc+0x13e/0x750 [ 2782.946737] ? set_anon_super+0xc0/0xc0 [ 2782.947192] ? rpc_kill_sb+0x1b0/0x1b0 [ 2782.947613] get_tree_keyed+0x55/0x210 [ 2782.948043] vfs_get_tree+0x8e/0x300 [ 2782.948449] path_mount+0x13be/0x20b0 [ 2782.948881] ? strncpy_from_user+0x9e/0x470 [ 2782.949343] ? finish_automount+0xa90/0xa90 [ 2782.949810] ? getname_flags.part.0+0x1dd/0x4f0 [ 2782.950316] __x64_sys_mount+0x282/0x300 [ 2782.950765] ? copy_mnt_ns+0xa00/0xa00 [ 2782.951221] do_syscall_64+0x33/0x40 [ 2782.951633] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2782.952194] RIP: 0033:0x7f508b208b19 [ 2782.952594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2782.954560] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2782.955415] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2782.956196] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2782.956986] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2782.957743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2782.958498] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:21:55 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x100000000000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:21:55 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xffff1f00, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:21:55 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:21:55 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x200000000000000, 0x0) 10:21:55 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 64) 10:21:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:21:55 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xedc0, 0x0) 10:21:55 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x8000, 0xc6a00) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x54, 0x0, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xffffffe0}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfffffffe}]}, 0x54}, 0x1, 0x0, 0x0, 0x800}, 0x800) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2795.876274] FAULT_INJECTION: forcing a failure. [ 2795.876274] name failslab, interval 1, probability 0, space 0, times 0 [ 2795.878974] CPU: 1 PID: 61765 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2795.880423] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2795.882103] Call Trace: [ 2795.882645] dump_stack+0x107/0x167 [ 2795.883408] should_fail.cold+0x5/0xa [ 2795.884189] ? create_object.isra.0+0x3a/0xa20 [ 2795.885128] should_failslab+0x5/0x20 [ 2795.885905] kmem_cache_alloc+0x5b/0x310 [ 2795.886723] ? mark_held_locks+0x9e/0xe0 [ 2795.887575] create_object.isra.0+0x3a/0xa20 [ 2795.888468] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2795.889491] kmem_cache_alloc_trace+0x151/0x320 [ 2795.890447] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2795.891459] __list_lru_init+0x44d/0x890 [ 2795.892296] alloc_super+0x8b8/0xa90 [ 2795.893052] ? fput+0x20/0x20 [ 2795.893692] sget_fc+0x13e/0x750 [ 2795.894371] ? set_anon_super+0xc0/0xc0 [ 2795.895224] ? rpc_kill_sb+0x1b0/0x1b0 [ 2795.896013] get_tree_keyed+0x55/0x210 [ 2795.896822] vfs_get_tree+0x8e/0x300 [ 2795.897578] path_mount+0x13be/0x20b0 [ 2795.898355] ? strncpy_from_user+0x9e/0x470 [ 2795.899243] ? finish_automount+0xa90/0xa90 [ 2795.900128] ? getname_flags.part.0+0x1dd/0x4f0 [ 2795.901084] __x64_sys_mount+0x282/0x300 [ 2795.901921] ? copy_mnt_ns+0xa00/0xa00 [ 2795.902719] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2795.903782] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2795.904832] do_syscall_64+0x33/0x40 [ 2795.905586] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2795.906621] RIP: 0033:0x7f508b208b19 [ 2795.907393] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2795.911071] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2795.912588] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2795.914004] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2795.915445] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2795.916883] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2795.918313] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:21:56 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xfffff000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:21:56 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xf000, 0x0) 10:21:56 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) recvfrom(r2, &(0x7f00000000c0)=""/69, 0x45, 0x10002, &(0x7f0000000600)=@hci={0x1f, 0xffffffffffffffff, 0x4}, 0x80) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r3, {0x6}}, './file0/../file0\x00'}) sendto$inet(r4, &(0x7f0000000500)="06b17ce5295e58097243cfc9f9564effee218e51a8f300091a7696b2e00164d777cb354bafafd3bab3561207cf27533be920d55bb18df46ab9a0e2a843cb44ac7e51d01b9d52013f7a8bfb099d4ba5cee9966bc283254cd3b9e493db8d4b3c194b4c2a61a3ceeb64f90726e62462ac7e0b05e6810bba88376c53821ac4d5e765a8e28a233b046878e0813de594bd3c943fdd32e1fe44d328e7d21e18368ece51ce70273fc106add254d1fab55a5611eba94c728a6ab4829b81f612c9c47f6c96c44e2f", 0xc3, 0x20000001, 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x108000, 0x0) clone3(&(0x7f0000000ac0)={0x135144000, 0x0, 0x0, 0x0, {0x3a}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:22:08 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x200000000000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:22:08 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:22:08 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xffffff7f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:22:08 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x300000000000000, 0x0) 10:22:08 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100), 0x4) r1 = getpgrp(0x0) getpriority(0x2, r1) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6, 0x0, 0x6, 0x0, 0x1000}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:22:08 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000500)={0x298, 0x35, 0x400, 0x70bd2d, 0x25dfdbfd, {0x6}, [@nested={0x281, 0x39, 0x0, 0x1, [@typed={0x4, 0x40}, @generic="371d6e895088b5c9b92ed7044baf4bbf502176b96dc7de18b61ff24934edc614b277476a5135362a0d491605ef07255dbdb9a0d5c8426c0b40c34a16226f365a6a0faaaf27c053dcc613a4f7cccf890fb74f623cf9f178ce13cc2ed63e661793bab09ab179f8f8879fbcd23f991fd7", @generic="b3d51a1966d8f5eb9ceae9b2ee8060e968199332397c74b34b0b9b9f9e18af47c871623ee874db0232c65af2ab74999992dde883d4686639d270b5dbb6b9f25fb9fea657329ae92864214f999c2a8f91a91afbaaac14a90f808d83268cc731f66239587f4c44749afa497ed5e6aae01e5de86b66e879c1a0642da6343ef2cf19b1d5897e52cfa22aaea522e4653b47e20d6271b736021c41706234d0081087fe42ab863372", @typed={0x14, 0x34, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @generic="3d71bdf87bb48fe684e5287f10b135592bffe4df4ade8f3f1813431b9b132f5bf8937b1e210899e0548a64bd2f55be55a88608c09404580ba24f6401836d4ca8322e115aedb3900a88c402912d2bb7f7af174853586249669c656a940ab861745bcac09b0eb8ab9a00c3253f7c0df46dee6617146dbcce26490fc7e19a0ae16295b3b0e3bd65", @generic="92834b2b34ade36c10f6b06ddd369f715eeeea591e5144f0638a4259092ca29ddded5beff5259cbfbf4568e3ae20874d4f916435924f153f301b5417d9fa33489408d5a23c60c42d98a555598d72456d2a5907fbaa1c24e49dc12060b98c1dfb212cbb2ee63c40d56838734ab357226e135d9496c4d43512064b1060c378b00caff2911172b836f3c4ea2f059358f15eb8d39a831efbf536c1deb7a4fdcb89c0d53dbb871ef886f094f52df4701f091771f9ee0db70a880fd75d0d0b4350175bc4c51e6e4b4b645e51215a"]}]}, 0x298}, 0x1, 0x0, 0x0, 0x8000}, 0x10) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {0x6}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:22:08 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xff03, 0x0) 10:22:08 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 65) [ 2808.620859] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53 sclass=netlink_route_socket pid=62302 comm=syz-executor.4 [ 2808.658168] FAULT_INJECTION: forcing a failure. [ 2808.658168] name failslab, interval 1, probability 0, space 0, times 0 [ 2808.660865] CPU: 0 PID: 62310 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2808.662293] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2808.664013] Call Trace: [ 2808.664565] dump_stack+0x107/0x167 [ 2808.665329] should_fail.cold+0x5/0xa [ 2808.666111] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2808.667154] should_failslab+0x5/0x20 [ 2808.667959] kmem_cache_alloc_trace+0x55/0x320 [ 2808.668894] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2808.669930] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2808.670936] __list_lru_init+0x44d/0x890 [ 2808.671785] alloc_super+0x8b8/0xa90 [ 2808.672552] ? fput+0x20/0x20 [ 2808.673188] sget_fc+0x13e/0x750 [ 2808.673876] ? set_anon_super+0xc0/0xc0 [ 2808.674693] ? rpc_kill_sb+0x1b0/0x1b0 [ 2808.675509] get_tree_keyed+0x55/0x210 [ 2808.676310] vfs_get_tree+0x8e/0x300 [ 2808.677072] path_mount+0x13be/0x20b0 [ 2808.677853] ? strncpy_from_user+0x9e/0x470 [ 2808.678734] ? finish_automount+0xa90/0xa90 [ 2808.679625] ? getname_flags.part.0+0x1dd/0x4f0 [ 2808.680590] __x64_sys_mount+0x282/0x300 [ 2808.681423] ? copy_mnt_ns+0xa00/0xa00 [ 2808.682225] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2808.683301] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2808.684357] do_syscall_64+0x33/0x40 [ 2808.685116] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2808.686158] RIP: 0033:0x7f508b208b19 [ 2808.686920] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2808.690672] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2808.692232] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2808.693686] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2808.695135] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2808.696604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2808.698048] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:22:08 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x20400, 0x1c1) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) open_by_handle_at(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="0c000000010000005d030000fbff1bffffffffff"], 0x20800) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:22:08 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x40000, 0x0) 10:22:08 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xffffff8c, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:22:08 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x1600000000000000, 0x0) 10:22:09 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x300000000000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:22:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000001300), &(0x7f0000001340)='./file0\x00', 0x3, 0x7, &(0x7f0000001880)=[{&(0x7f0000001380)="4c02d58c03eb566470ed33ad6f6d2d3e53d7f1e02271184a2e1d0c", 0x1b, 0x100}, {&(0x7f00000013c0)="5adb31f85e4f5b8b60960a34aab390fa5a6aa090c7633372bceb8db7cdb475263d1e5c6138aa8d94c047e2ba3c1d18acbee576f82a20c89689228dc3716eef609601ee8852725b8c5d297daec3ae23ce6013afcf22f2d469ae347c94c1ce3ae9a53c4789e374e943f23c6669e5ff09ce05b021b6a7b364230b7cf464ea8140fa7f89e4a1e1a3dffa93d4c9a05ea2eb76afade81336ce8c747d9fa029ef0657f5c67731bca76bc85c08a159eac02ca1ed8a469d3cbdd0dccee4d7565dea1f8a757802840aa8088076f48446647f86865860c0963e70b8c97e0dac33669c2f433702288bfe8101d58276e7c202b8b47f3d4f2a5382e072813326", 0xf9}, {&(0x7f00000014c0)="cc22f081b3709c54cf1567b6f63d6b1a72c96926fba1a51f347c55c1ed9509454fb8f991e98e38e20c510420520b2b35229caac88f0ed8dae2c1192b73fdca172c31a4940775ad143c4ebc37e630868bf8239e6d4f61392809c4b9a89ff509794748231ac26fad96", 0x68}, {&(0x7f0000001540)="7ce711837147bd3d1309e508e76d0e8b3f404df2a6417b5e8d5a9fcccb194acf71ec4ad2e06f6dde89f69aaf554f07f0a522e674091437a55db1efffb5658d5c0764a169aea510c9d632560f6cd9d8a7f4ac4d815690921796d2f9c4216eb0379ded4269dc5a8b405f7a9ba361d25716f1577f21fa6960f10a53b2a8f9dd34a207de16f70304", 0x86, 0x4}, {&(0x7f0000001600)="ada16fd356b39f7f4fe6227abb4656a80be35aba9324187854232550e430e47c0246a6501acf01a81e84f5d056f4882fdeb9d8ff5bec2410e276e850641e6d512227972f2079011bb6c2bc48480fff6c0364ddec89447bd2b213e246959929627c7529e1662a1bfcbcabed99be13f8635c2fef64e3e8d9eb7ef5e269821330741f1574c49a4473bc1cd551fe5aeca0440585bb4924b7461cc70911e7b0e7633d3a08aa6573dad32552cbfa3bb37448720472d651b9d1b697fce9a154922e84c183a0760244ac2b4c228e54bb1298c0f46be2a6ada5ce042809f4b62312c65dafa2aeabb726d1e34a803986d433433b", 0xef, 0x800}, {&(0x7f0000001700)="c8f6d46fa9f4dc97ff342a687e0fd39e6fcd835d9d0484cb1c4e8ffa1af4f05d4f2bb4075112a341c79558d3bc172ec081d49919d52b946303889f0710b00e7261e702037d895a245f22f0da28e6eaa612b7f95f382721", 0x57, 0x7ff}, {&(0x7f0000001780)="8d38f6e2084e37ec9b6ccda90e79c62f434f67b25bfd501fa0e78f9cabd051179d61ca211614d5e6f866743f1cdc79c27ab6d8eeba8634837f4b4a9760450d02cbf5af33bf74181342cf9de77bc94c4d92741d4e366c1f496ec093a389114723878cf404ff6c1de7680eeb1e9addec7807a98027cd3999240f091c5e14c81e72095fa25ea11a802d03f722e7fa977545a4688110c2df9276f9711f9701f9b252b85ec37d6ee3998a09f464efac134aa78e6e54865fa8a941245c3c8e09e8bd78ae38a3b5b4ac715da3c3433c479b4a80f066c28700163311f2ff33451526f4894c", 0xe1, 0xfffffffffffffffc}], 0x90020, &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="2156d55d29fed6713b72b9367459768c68bab1e3f59aa7e497d52c2febfcda75fcc74a39c3b765339d8cca90e7542bf0bcf2d4aaf31fd3da944dc534d3bc7284a09626fce8e13792185233ce72056e0f8b1a16e63fc834cd3ca5179e2ba98ab723820c96bd8f95f9b8bda790940bb8c4c4d70e78b93f282e5b7e91976f140788b2e6a5b8a760a686bb2d0e9f5c2813bc1e09722b17329675bea4aff9a94c6090c39009532efb0fb2dd3dba0d68ff93a2628f12432dec922714fa", 0xba, 0xff}, {&(0x7f0000000240)="f4db504e44b85ee888081b2195881b7ff81f0b9719c59cf8ec8aba4a7a190906f99e1767419422a1adced8c83f64129be688fc86c28d3e5ace297fe3e1f23addeb8654ab34db2d02f8741436b269bd463eb7110f04b7ceb62298c7ef490535cd12ebfbf421ac360cc2d3cadb8a2bd6cdfb1beeb428d30a2771066c8a406a25364fa1907ec2d8b511925607f0e341ddddb05d75e45d2460f0512cc71bce1a48fdd7f3796e719252f24ae87eab2896987ba9c050c97f33fe68ebfab6a7d5ecfd4dbde7c06858264b57e230a7f0d2b9875f56ffebac529ea696a2c1faec58261d1fbb979957fc3345450ca6ee0af3491a06570bcedab4a8c30e660a9d90c4def0fcb59693c236226892001783c4bd93d0dab3391bb94ff922fc04b1c3f5013bcbcd6cd7ce1301520257540bde5970dcde4886ae338dd53cf966efe3d2a05bdc6ce37e1a8e4aa9d20048ff3767ff681f7ea7bcd396519930082f6312e89fc48bbd7dd3a097f11562c0298d43ca48c9b716cd9e611d7530c35be6f12b30db2f08a20dc42400aba771e6def47fb2b1be6fdd8192641886b626f4ace724fcc1113a173b07af33e61fcfdd9765aba2548488cb2cf2729b5e0647bf81dd47c3f3a8f0e1d23e612584670cfe8e4f4026a663c7c1a741dcba9bfda5eb802a9fa32b9068df844737377dc4a4d17409a7300977723c045f83cc6794a24ae470b631a62e7556b0c3e6a0c892715053a272c361559bed68b5f5bfc21eb5b3ff01151e0c77a339898113e0a2757c07c1582dc580140aaef7e59f6e44d1a602fc00a06b6f1d00e6327682bde56b12f707ceef767503eaeeb0106badb65ea30873e88b4efd0ffc5773830c21db09f81891377e337d28df0ab69ddf37b0b7b15aadb4478e4461d2be0f6bb6c95f0a536509b4c9f36f4042a48996c1aac339e5cbb408746293a4f94dc907e6104c62e429ec20fb5baf2acf8055f219bf389eee85ff2f2c9aec5ab956de18ee66bc0b3c548254a7234d1e7ebddced2d164e5771336f95bccb661089fe1049d15a7c74b2b77ed63290876c6d4690e1bc1c94a2259523a0d0c3fe24c07014f7d9f23efae69495cdee61593cc7f0007114b01ffb91da3c4e5819984d53e9aa4f765e17e8690c9630a805f0c5ff038f896dc032401b13aa8352191da6312a698f7ff76b7717eb0fa3efaa5eb837073e3d455d718e2e215e116b7f3b54f3e6a447a42de3d8c736088a6c500b91e0d60bad9fc671d42cf41d43fb7334b8f3ad778d6cf23803b909aeb892a1ff213f1b44bd9e439e9b04ba54ec87694f4cad2623a3250b5395392dcaec6f74cab323a1099d9e38aa7d6b138cfe089a1f3ae84d54f5890ad49a5f181243f97464a47086f53f36649780662345ad85835255c18c8100eed9bdc03d5027ee476e8ad6ee0a9074625811a3685e9fa2d2f3a1c184a84d4015a33c647fbcfacf43244887efec62869337f986b96871dc90e209491d992f629798172bf91f2a7c74ff7d600efb2a870a115bbdd4e93736d4d49559a4834ac7c0ea84d7128f1c52b35c9190e33689ed5be78b0dc1fc5bc5d496d8d40fe8cb24de0defe3de81c3d0d4cdd5d6415b9c9a06664c988bc7381da878c7aecb69571f8d413beedced4c4a097b873f66eb9316fcb0c4de05b60a4f2301beff077291c77b84aeb1930b884363fc6c393b5d368e51db6af79eac16563a6d84c70b962416be7942a295fc4b0a3286c3fe459eea332d3ac186f50ccc5ad23dd636627ff2ab08956eebe66fd80fa1f5c395fa4a2343abb112a28bf2589b50db128324b7127785afbbf6cc557f9afe821e7142d99b66ff4d412ae97eeb27692f7e01decd0550ed4f4235da3cbd1900dd018806fa875d78e5f0895f68b5e648db0f075e1f45fce187860e7452c06ac65b4103a0356507e3558caa6c352fed16b2805101f82e62df9ae172a157c94a272dd2a0c50f59dfd5fe0881bd1ad01cea6d1b28c0ecab13f91e4eb5a522f7e022993dc7b15bf2c4dfc082570187719f642722b969d07a120d6727dcc91459f9fa82baf60746afd724ed12ddd2f11df4c39e515f20dfa5dabc34b4312da73783a646ff649d1643c3dc2f4e6e96b340477d663fb6acbc2c5726653e7b8fa4c55ffbd15f1551a73d91efa73173a53a5c5f78f04171bb1dee484eff474bd056dfc8101b8e36242d54b0af302c2609585387351ebc07bf96cf2471d3e8a043fcc2e59bced3ef88d30c3bb485d0a95920ea439c5233c21588fb763635a52ed98656fd54d2b2fd12ef94a755f32aee6c13f5935e681dc5aced757aaa1fb90c66660472115e3a703e637ec19ad8209bdb13345a2d3176f039f571f078ed2a02a1e796441b67ce2a24eb73b52554db229fdc58cbb5b8f3e24afc22b3af649794e71dd924fbf6b706eff3bdd6fa9974e9d925da2d8fd356c9ded36a8ee414d0f15f96c1f2c2997592bbbd7aab4108cd40f865c4e0fb6df4cacef536d105181d2b5ce3fe49c305a5a5a23fd32807eb44433199f3e861bad16788e36eb9169e58c47f2e7ec05ce52a7ccff2ab3f23b9f6e6f8e7ac1a3594e399cd4943132af2d2c2235562860ef81d02a5aac9fd5f335adead105794237105356f7a7f15d02370b619312f8b3860e82d0d39cba72849d831213122a7d86756d6b42467195610e9f643ebaef3157cda5f9f475474c8ec4aa38b528e6ea2905f183d43b46c10dd0efbd8982c34372fba7debc052e9d66876896a56cede202a6e2d4969e7553dab62507560461f27f6bb9318af0406083c0e04c9160aefd67c47b9fe1d569d71db0c1541a270015a62731bd838b2408ced958e0b2fb2ab60ddc2367f67d073ca90bd7262f046e77a3935a625c0ba1592876f1fb2cd826370e5bf0f761d52e08f2fc70e588b93ed6b1cb0d8ad37bb92a6297b2bb59d22425fad454a5c74cd6773d7eb248d306a526035f880af100d204278606975649ce0ec4dafc9bfd201f0639dafea82726f5265828756dcac0c6ebc019715f17690a87c7ad1a34afb811aa67095a98700fa32c3669e7b0309d517498237f34f9773e412d28399f56f6cc648b18d8da04d37293c757fe7ec4a7e69f1e187671bc2dbc8876bf2d005e636891f7c974f0fc15323b1d228801ddd103d486799cf646af3a48744bb67818e2aaf26c248756bce891c4d10ec851c7ddff0769177e72975fd9d32d153ac114a282b2db6ef3676a274ce132e07e621f31df5c8a5b35d4fbbbcfba06d1c7fa348746a7a2a1b563d8cf17e5928ecaf0334f44c790418a13432b823c1c1e58eab18c6a0a6771adac1778fe4dbd4400108d71f0e6f4017e489521066c055ffc676e6e2123860a3bd4d74ad60e692f3510892fa08dba7e0e184765bd10d36e90f3a4b66220c15c616447036ed8ea6f7a096f63ba5d39d568d90341a30c6a6ff6bc4471cff091c445b48b21d82dd2fd42943bf6ccbf9a38f3a9df7e15a9b41abee626b604f8d6198a0984b4e14296f98ff09d08e5ed3f7adb88132682c8a07a8dda584f6664d315eddbb135e092161a35bafd602f29b7165d4c8f93c2cacad292ac9d1e9f0ce848d4f8055a934cded4e3e6d6334ff94a33f5a8d448194f9815c504f09485aa02bf628bd95dae3f25b01342fa74e7ca6892ee56d487bc8faa0e1eacc59d1652885195a44a434138634ddbec75e58528e3b05250a7423f0c29d0abf68d84be99f2db37ad4d0398aa0f6fb248731fb749aa880558acfd71d46a5a1696f5a728a37a3b6396c1764c6edbd0f9747f6dd0c4b88417bb466b2959ad3f15414645daf7dbec1e3bdfb877b65bf27af7cd2685f776986b9bfe5920acf8cf893fc44afcf68a88d11ad0d4a47dd2398889b6ed91d512477891729f3ca8efa13e3fb8aeb34cf68a035b97b652c922882ace67a9b40e98525ae752ff770dca5fa99ca1b9c4ba328fe0621002279a12c951574483bdad155eca9125b1e31a0bfbd5425a4ed537b2bf34f1be06732672102792e604690c23afb5a92b13a6127aec383c25956753eeffe99b3f764c9d8e726fe67ac4a47f79f6c43cf414267e5d9e1ee09f08a86097d727cc77e42361fc9842cb285ce138f528b023590ccd9f8bd759f6dfb9b759eb5ffbde17c4e30463254a49d63a6ec8e5044ea6c253b2588d34cbbaf0e968484666303f3434b8e6adbd4f92b3473cdf094a34b35ce6248d064869e955ee5a1c01a26d32d6c46799cc2de0126f64d8b764989118809df577dc732d3d30191e633173bbcfa4d168270869aaad9362fbed225f53169d3ab2cd3929447f40279a45d2de06e6093b1d49fb0cf3e5936e796ee32639cfd035bbebb4d1af780d498c83c69f685f4607047a038bec625b303c04a29e47482840cf23a10ffa7fd25c694c22118b66ef0bb5cc3cb097359c54cf2e6a4c3c792f02311770211f0cf509c18cc84efed9879760f5434184e523def1e2949d8ffc049133bb87b1ad335fbe06f3f867a49980f74be35faf2a546bb7842ffcd9b6c055d4449d1271d21fe6fc8cf71a8aa888ea039c25966921319086024c08a8b6d7816340e2c759a3dd1761e12fba30f781b6f59023ecc890dcf91d37f494070b1a3058a8c1f3e2b4d5b9881852e2c82f629ecd0cc158c5e7ac9b00edd6e7493ef22ace3b15561daaf0e37e6ac7d9308b32cf04f10ebfb41101a5c62f10ee3e79f54f39d80619844cb820905503f7c4411a9484a38e153d5b6665af2e9edb4f30dafe82aff42b31cba5110e8d228eb5e9df0e7b09f1bbcbce5229865b019e8cf8de665619701bd64d38ff611ef1be5aae5c7b56ac53e0c1785380b2b6d6eb92d0148b7aa16ce12883df340906b4a1c99f3e0287b7a5dbaf448337c8ca3aa3ae00dfbd2719b6cf97db5ff9d30b732fd664e646a271d30f82584cd49b7bf6edeeb7ac9d1081e9b3b559b03a48e6aa2320653ecba4c53d7b0a14dc3a089ae6486a54408e84951bfb36bf6086a07723549fd522df135d0be74e3c9b0028410d67317ef1b651158a061480d885f349243d27886336e3b4d8c2a5a05e38105d64121df3e818e381f757199d76efffe220b35b6150c9a6c3a4240996ac2d0947c99c98dcd1a889fc7ff1427a8b8f74025012970ed5bc66a9a85dd5df6f080cfbaf71e1cc7719b148431af04b1e89b3dc3ddf9562f21973a0048d0fcbd09768d00227e81a8e8227425125904985ad1d468d7643f2261b9ff4a4f8dd8adf1f600da942e911c77ed1ab58a5c62f26dfa104ec4c2f14ffeb62f3466756cd77a4b8f175bf5c5f93f887c9e1f41e8f5d5696184445ecb84f340e05d52b48aa8d8f2c2b8b47a32c69c00f604cef284d748a40fc934dfcf3d547da67e4bb159b2b280ac063fd0b603b0723a07f8db96e23879d1f6b980fca59054276bbf32746116e984f51dcf40f09c677c68c327682c7b029300795199fbadda9176ecff7f6868427e47627ce6591a97268b796e8df4034355c3a91cbfb7b9ea55b4545d8ff058c6d5af9a9519939a3e77c0fc5f8c6c2dd62d4c4d00d149b8c0acff7f73bf1e0e4a8c4ba6c599aa22be189b988d9c7fc60fc6cc7c67902bf0325a5579e80f6bf24dbac11cca72ee0a8cb841fe6b472abed9c929c6f2cb8103288c35724742848bd3ab29369350d7b45f4e31f2cb49fbce8c3aaafc06da8cafa94dbaab37c7210001d7d03d7260143b9e56af6fdbf17de8695d0dd54d6d12ef187a53bfc33ab853d447b90315ecca10c6181377c966584fe337de04a61f1a6ed78f6bff1e60642bef3940d4a5fbc6779873c3a714ce7805a454", 0x1000, 0x10000}], 0x20, &(0x7f0000001240)={[{}, {@data_ordered}, {@max_batch_time={'max_batch_time', 0x3d, 0xffff}}, {@noblock_validity}, {@block_validity}, {@data_writeback}, {@nobh}, {@quota}, {@grpjquota_path={'grpjquota', 0x3d, './file1'}}], [{@seclabel}, {@appraise_type}]}) ftruncate(0xffffffffffffffff, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:22:09 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x80000, 0x0) 10:22:09 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 66) 10:22:09 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x2, 0x10202) sendmsg$IPSET_CMD_HEADER(r3, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x44, 0xc, 0x6, 0x5, 0x0, 0x0, {0x2, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x80004}, 0x4000080) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:22:09 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xfffffff0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:22:09 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r4 = accept$inet(r3, &(0x7f0000000040)={0x2, 0x0, @initdev}, &(0x7f0000000080)=0x10) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e24, @multicast1}, 0x10) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2809.182816] FAULT_INJECTION: forcing a failure. [ 2809.182816] name failslab, interval 1, probability 0, space 0, times 0 [ 2809.185972] CPU: 1 PID: 62825 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2809.187668] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2809.189678] Call Trace: [ 2809.190323] dump_stack+0x107/0x167 [ 2809.191233] should_fail.cold+0x5/0xa [ 2809.192101] ? create_object.isra.0+0x3a/0xa20 [ 2809.193005] ? create_object.isra.0+0x3a/0xa20 [ 2809.193907] should_failslab+0x5/0x20 [ 2809.194657] kmem_cache_alloc+0x5b/0x310 [ 2809.195473] ? mark_held_locks+0x9e/0xe0 [ 2809.196290] create_object.isra.0+0x3a/0xa20 [ 2809.197162] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2809.198166] kmem_cache_alloc_trace+0x151/0x320 [ 2809.199091] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2809.200069] __list_lru_init+0x44d/0x890 [ 2809.200873] alloc_super+0x8b8/0xa90 [ 2809.201624] ? fput+0x20/0x20 [ 2809.202255] sget_fc+0x13e/0x750 [ 2809.203027] ? set_anon_super+0xc0/0xc0 [ 2809.203933] ? rpc_kill_sb+0x1b0/0x1b0 [ 2809.204797] get_tree_keyed+0x55/0x210 [ 2809.205678] vfs_get_tree+0x8e/0x300 [ 2809.206511] path_mount+0x13be/0x20b0 [ 2809.207390] ? strncpy_from_user+0x9e/0x470 [ 2809.208366] ? finish_automount+0xa90/0xa90 [ 2809.209334] ? getname_flags.part.0+0x1dd/0x4f0 [ 2809.210388] __x64_sys_mount+0x282/0x300 [ 2809.211310] ? copy_mnt_ns+0xa00/0xa00 [ 2809.212201] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2809.213264] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2809.214326] do_syscall_64+0x33/0x40 [ 2809.215091] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2809.216156] RIP: 0033:0x7f508b208b19 [ 2809.216921] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2809.220658] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2809.222174] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2809.223615] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2809.225055] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2809.226495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2809.227959] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:22:22 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:22:22 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0/../file0\x00', 0x801, 0x1) 10:22:22 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xfffffff6, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:22:22 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x1fffff, 0x0) 10:22:22 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2000000000000000, 0x0) 10:22:22 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 67) 10:22:22 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x1600000000000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:22:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffffffffffbff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) [ 2822.833346] FAULT_INJECTION: forcing a failure. [ 2822.833346] name failslab, interval 1, probability 0, space 0, times 0 [ 2822.835018] CPU: 1 PID: 63162 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2822.835844] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2822.836771] Call Trace: [ 2822.837083] dump_stack+0x107/0x167 [ 2822.837522] should_fail.cold+0x5/0xa [ 2822.837966] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2822.838538] should_failslab+0x5/0x20 [ 2822.838973] kmem_cache_alloc_trace+0x55/0x320 [ 2822.839514] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2822.840107] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2822.840683] __list_lru_init+0x44d/0x890 [ 2822.841157] alloc_super+0x8b8/0xa90 [ 2822.841598] ? fput+0x20/0x20 [ 2822.841950] sget_fc+0x13e/0x750 [ 2822.842358] ? set_anon_super+0xc0/0xc0 [ 2822.842831] ? rpc_kill_sb+0x1b0/0x1b0 [ 2822.843289] get_tree_keyed+0x55/0x210 [ 2822.843768] vfs_get_tree+0x8e/0x300 [ 2822.844221] path_mount+0x13be/0x20b0 [ 2822.844695] ? strncpy_from_user+0x9e/0x470 [ 2822.845234] ? finish_automount+0xa90/0xa90 [ 2822.845767] ? getname_flags.part.0+0x1dd/0x4f0 [ 2822.846334] __x64_sys_mount+0x282/0x300 [ 2822.846831] ? copy_mnt_ns+0xa00/0xa00 [ 2822.847267] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2822.847908] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2822.848547] do_syscall_64+0x33/0x40 [ 2822.849010] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2822.849640] RIP: 0033:0x7f508b208b19 [ 2822.850084] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2822.852314] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2822.853253] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2822.854130] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2822.855002] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2822.855885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2822.856754] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:22:23 executing program 0: ioctl$CDROM_GET_MCN(0xffffffffffffffff, 0x5311, &(0x7f0000000080)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x80) 10:22:23 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 68) 10:22:23 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2000000000000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:22:23 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xf0ffff, 0x0) 10:22:23 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xfffffffe, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) [ 2823.035934] FAULT_INJECTION: forcing a failure. [ 2823.035934] name failslab, interval 1, probability 0, space 0, times 0 [ 2823.037139] CPU: 1 PID: 63423 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2823.037820] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2823.038737] Call Trace: [ 2823.039014] dump_stack+0x107/0x167 [ 2823.039398] should_fail.cold+0x5/0xa [ 2823.039789] ? create_object.isra.0+0x3a/0xa20 [ 2823.040249] should_failslab+0x5/0x20 [ 2823.040631] kmem_cache_alloc+0x5b/0x310 [ 2823.041086] ? mark_held_locks+0x9e/0xe0 [ 2823.041497] create_object.isra.0+0x3a/0xa20 [ 2823.041941] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2823.042451] kmem_cache_alloc_trace+0x151/0x320 [ 2823.042967] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2823.043464] __list_lru_init+0x44d/0x890 [ 2823.043921] alloc_super+0x8b8/0xa90 [ 2823.044302] ? fput+0x20/0x20 [ 2823.044619] sget_fc+0x13e/0x750 [ 2823.044992] ? set_anon_super+0xc0/0xc0 [ 2823.045403] ? rpc_kill_sb+0x1b0/0x1b0 [ 2823.045842] get_tree_keyed+0x55/0x210 [ 2823.046250] vfs_get_tree+0x8e/0x300 [ 2823.046663] path_mount+0x13be/0x20b0 [ 2823.047060] ? strncpy_from_user+0x9e/0x470 [ 2823.047519] ? finish_automount+0xa90/0xa90 [ 2823.047986] ? getname_flags.part.0+0x1dd/0x4f0 [ 2823.048485] __x64_sys_mount+0x282/0x300 [ 2823.048916] ? copy_mnt_ns+0xa00/0xa00 [ 2823.049323] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2823.049894] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2823.050440] do_syscall_64+0x33/0x40 [ 2823.050839] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2823.051364] RIP: 0033:0x7f508b208b19 [ 2823.051772] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2823.053717] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2823.054547] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2823.055289] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2823.056087] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2823.056876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2823.057616] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:22:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x7, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:22:23 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2010000000000000, 0x0) 10:22:23 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x1000000, 0x0) 10:22:37 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2e00000000000000, 0x0) 10:22:37 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2010000000000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:22:37 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2000000, 0x0) 10:22:37 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) sendfile(r1, r0, &(0x7f0000000040)=0x6, 0x41) 10:22:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 69) 10:22:37 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) r4 = epoll_create1(0x80000) dup2(r3, r4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:22:37 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xedc000000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:22:37 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x7f, 0x4, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="1e6091812433f37b6d920000"], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x4) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000100)=0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000001e00)={{}, r4, 0x2, @inherit={0x68, &(0x7f0000001640)=ANY=[@ANYBLOB="00000000000000000400000000000000070000000000000009000000000000000000000000000000000000000000000007000000000000000000000000000800000000000000000000001400000006000000000000000300000004000000eeff0000010000000000b9ce8477338dd226f33ebe404960a5c8110a8e5d357bf1557a4fbb72fdebe052631da701495ea76de1a41e73ed9f5a5071ebf50ec4e74b5c7e0cce69aeb65343c2d5b9ede9d191d9fe01b689c25b07febba56bd8f9f49c54356a6f42bc6d044ec945f9a9a3e4afce2b5cd3a4c6d1f2a3a34152c9a6e37d15"]}, @subvolid=0xe1}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000000440)={{}, r4, 0x10, @inherit={0x68, &(0x7f0000001540)=ANY=[@ANYBLOB="000000000000000004000000000000b3009e3b000000000000ff7f7600000000002200000000000000723c00000000000002000000000000000000ae3b7c9500000104000000000000010001000000000020000000000000000600000000000000ff7f00000000000044bfb0f0c6374b1c26bfdea86f63f80c41245a3db39a6e9d0a667f7208a0dfa5758d9570298afad8cee16322afcc6e272fe9fac0d4c513cd6f26db138427d0f6f2369267f34b9a22b4d4a0c6b6241d27b2586e43411afcb54c0abdfca5a2fe58d01b0f481d467da1f72148b0228dfd84f9ff3a2f54ebd725"]}, @subvolid}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000500)={"b84d6a2226c3583053f2a26c033424e2", 0x0, r4, {0x0, 0xad36}, {0x2, 0x10000}, 0x6, [0x8, 0x37e6, 0x1, 0x6a71, 0x2, 0x9, 0x3f, 0x1, 0x7, 0x100, 0x9, 0x6712, 0x2, 0x7ff, 0x6, 0x8001]}) [ 2837.512119] FAULT_INJECTION: forcing a failure. [ 2837.512119] name failslab, interval 1, probability 0, space 0, times 0 [ 2837.513783] CPU: 1 PID: 63817 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2837.514578] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2837.515498] Call Trace: [ 2837.515833] dump_stack+0x107/0x167 [ 2837.516267] should_fail.cold+0x5/0xa [ 2837.516715] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2837.517339] should_failslab+0x5/0x20 [ 2837.517785] kmem_cache_alloc_trace+0x55/0x320 [ 2837.518334] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2837.518949] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2837.519535] __list_lru_init+0x44d/0x890 [ 2837.520041] alloc_super+0x8b8/0xa90 [ 2837.520493] ? fput+0x20/0x20 [ 2837.520870] sget_fc+0x13e/0x750 [ 2837.521277] ? set_anon_super+0xc0/0xc0 [ 2837.521759] ? rpc_kill_sb+0x1b0/0x1b0 [ 2837.522226] get_tree_keyed+0x55/0x210 [ 2837.522697] vfs_get_tree+0x8e/0x300 [ 2837.523146] path_mount+0x13be/0x20b0 [ 2837.523621] ? strncpy_from_user+0x9e/0x470 [ 2837.524141] ? finish_automount+0xa90/0xa90 [ 2837.524660] ? getname_flags.part.0+0x1dd/0x4f0 [ 2837.525225] __x64_sys_mount+0x282/0x300 [ 2837.525712] ? copy_mnt_ns+0xa00/0xa00 [ 2837.526181] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2837.526813] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2837.527437] do_syscall_64+0x33/0x40 [ 2837.527885] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2837.528495] RIP: 0033:0x7f508b208b19 [ 2837.528944] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2837.531123] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2837.532019] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2837.532886] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2837.533714] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2837.534552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2837.535393] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:22:37 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x4000000000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:22:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 70) [ 2837.687165] FAULT_INJECTION: forcing a failure. [ 2837.687165] name failslab, interval 1, probability 0, space 0, times 0 [ 2837.688798] CPU: 1 PID: 64124 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2837.689533] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2837.690431] Call Trace: [ 2837.690727] dump_stack+0x107/0x167 [ 2837.691132] should_fail.cold+0x5/0xa [ 2837.691542] ? create_object.isra.0+0x3a/0xa20 [ 2837.692057] should_failslab+0x5/0x20 [ 2837.692468] kmem_cache_alloc+0x5b/0x310 10:22:37 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2e00000000000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:22:37 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x8000000000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) [ 2837.692919] ? mark_held_locks+0x9e/0xe0 [ 2837.693537] create_object.isra.0+0x3a/0xa20 [ 2837.694045] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2837.694605] kmem_cache_alloc_trace+0x151/0x320 [ 2837.695110] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2837.695654] __list_lru_init+0x44d/0x890 [ 2837.696102] alloc_super+0x8b8/0xa90 [ 2837.696518] ? fput+0x20/0x20 [ 2837.696856] sget_fc+0x13e/0x750 [ 2837.697231] ? set_anon_super+0xc0/0xc0 [ 2837.697689] ? rpc_kill_sb+0x1b0/0x1b0 [ 2837.698138] get_tree_keyed+0x55/0x210 [ 2837.698583] vfs_get_tree+0x8e/0x300 [ 2837.698972] path_mount+0x13be/0x20b0 [ 2837.699401] ? strncpy_from_user+0x9e/0x470 [ 2837.699889] ? finish_automount+0xa90/0xa90 [ 2837.700367] ? getname_flags.part.0+0x1dd/0x4f0 [ 2837.700886] __x64_sys_mount+0x282/0x300 [ 2837.701338] ? copy_mnt_ns+0xa00/0xa00 [ 2837.701787] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2837.702378] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2837.702959] do_syscall_64+0x33/0x40 [ 2837.703376] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2837.703958] RIP: 0033:0x7f508b208b19 [ 2837.704349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2837.706389] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2837.707234] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2837.708029] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2837.708822] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2837.709602] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2837.710404] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:22:37 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) r4 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xf4, 0x20, 0x7f, 0x5, 0x0, 0x9, 0x50002, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000040)}, 0x13101, 0x2, 0x2, 0x9, 0x6, 0x46, 0x5, 0x0, 0x80000001, 0x0, 0xcd49}, 0xffffffffffffffff, 0x4, r3, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r5 = clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r6 = dup3(r0, r4, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x20, 0x3f, 0x0, 0x7, 0x0, 0x4356, 0xa0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xf41, 0x0, @perf_config_ext={0xffffffffffffff80, 0xffffffffffffffe0}, 0x40390, 0xffffffffffff0001, 0x80, 0x0, 0x10000, 0xbe, 0x0, 0x0, 0x5, 0x0, 0x6}, r5, 0x3, r6, 0x19) mount$9p_unix(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000340)='./file0/../file0\x00', &(0x7f0000000500), 0x800, &(0x7f0000000540)={'trans=unix,', {[{@dfltuid}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x64, 0x6e, 0x37, 0x63, 0x32, 0x30, 0x37], 0x2d, [0xc5, 0x62, 0x35, 0x63], 0x2d, [0x37, 0x33, 0x32, 0x32], 0x2d, [0x63, 0x35, 0x38, 0x34], 0x2d, [0x35, 0x36, 0x65, 0x35, 0x30, 0x36, 0x35, 0x62]}}}, {@subj_type={'subj_type', 0x3d, 'rpc_pipefs\x00'}}, {@audit}, {@appraise_type}, {@seclabel}, {@obj_role={'obj_role', 0x3d, '!.'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@euid_eq={'euid', 0x3d, 0xee01}}]}}) 10:22:37 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x3000000, 0x0) 10:22:37 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xf0ffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:22:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x4, 0x1f, 0x2, 0x2, 0x0, 0x7fffffff, 0x28, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x1f1, 0x7}, 0x9080, 0x78f1cf1f, 0xfff, 0x5, 0x2cc, 0x401, 0xb30, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x3, r1, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x400100, 0x144) 10:22:37 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2f00000000000000, 0x0) 10:22:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 71) [ 2837.887159] FAULT_INJECTION: forcing a failure. [ 2837.887159] name failslab, interval 1, probability 0, space 0, times 0 10:22:37 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x26, 0x0, 0x49, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x10}, 0x0, 0x2, 0x0, 0x0, 0x974e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$inet6_udp_int(r2, 0x11, 0x1, &(0x7f00000001c0)=0x5, 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) [ 2837.888818] CPU: 1 PID: 64320 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2837.889588] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2837.890432] Call Trace: [ 2837.890707] dump_stack+0x107/0x167 [ 2837.891082] should_fail.cold+0x5/0xa [ 2837.891473] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2837.891985] should_failslab+0x5/0x20 [ 2837.892365] kmem_cache_alloc_trace+0x55/0x320 [ 2837.892874] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2837.893429] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2837.893968] __list_lru_init+0x44d/0x890 [ 2837.894425] alloc_super+0x8b8/0xa90 [ 2837.894848] ? fput+0x20/0x20 [ 2837.895183] sget_fc+0x13e/0x750 [ 2837.895575] ? set_anon_super+0xc0/0xc0 [ 2837.896012] ? rpc_kill_sb+0x1b0/0x1b0 [ 2837.896433] get_tree_keyed+0x55/0x210 [ 2837.896882] vfs_get_tree+0x8e/0x300 [ 2837.897276] path_mount+0x13be/0x20b0 [ 2837.897712] ? strncpy_from_user+0x9e/0x470 [ 2837.898179] ? finish_automount+0xa90/0xa90 [ 2837.898662] ? getname_flags.part.0+0x1dd/0x4f0 [ 2837.899200] __x64_sys_mount+0x282/0x300 [ 2837.899650] ? copy_mnt_ns+0xa00/0xa00 [ 2837.900087] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2837.900658] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2837.901246] do_syscall_64+0x33/0x40 [ 2837.901655] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2837.902196] RIP: 0033:0x7f508b208b19 [ 2837.902617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2837.904647] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2837.905482] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2837.906282] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2837.907052] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2837.907866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2837.908645] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:22:38 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x100000000000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:22:52 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) write$binfmt_script(r1, &(0x7f0000000040)={'#! ', './file0', [{0x20, 'rpc_pipefs\x00'}, {0x20, '](\xfd\xcf)]'}], 0xa, "9737e516af13a842215bbbb059543bc2eacb4ec7c0c83bc3621adf28abeae76bac3e8a3e2a0afc8a81f430bc30dba8b912d4522c445b6ffb4fd2e216cdbf3630f08fb1eb3561ef8a84ca3689cbc3ef136351e5f3d59f"}, 0x74) 10:22:52 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) getpriority(0x2, r0) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x55, 0x4, 0x6, 0x0, 0x2, 0x100, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xa08c, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x8364, 0xffff, 0x6, 0x2, 0x57, 0x6, 0x0, 0x0, 0x7, 0x0, 0x5}, r0, 0xd, r1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:22:52 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2f00000000000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:22:52 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x3801000000000000, 0x0) 10:22:52 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00+'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) unlink(&(0x7f0000000040)='./file1\x00') 10:22:52 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x200000000000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:22:52 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 72) 10:22:52 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x16000000, 0x0) [ 2852.486940] FAULT_INJECTION: forcing a failure. [ 2852.486940] name failslab, interval 1, probability 0, space 0, times 0 [ 2852.489818] CPU: 0 PID: 64583 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2852.491229] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2852.492916] Call Trace: [ 2852.493455] dump_stack+0x107/0x167 [ 2852.494197] should_fail.cold+0x5/0xa [ 2852.494964] ? create_object.isra.0+0x3a/0xa20 [ 2852.495894] should_failslab+0x5/0x20 [ 2852.496665] kmem_cache_alloc+0x5b/0x310 [ 2852.497476] ? mark_held_locks+0x9e/0xe0 [ 2852.498290] create_object.isra.0+0x3a/0xa20 [ 2852.499172] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2852.500209] kmem_cache_alloc_trace+0x151/0x320 [ 2852.501143] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2852.502134] __list_lru_init+0x44d/0x890 [ 2852.502962] alloc_super+0x8b8/0xa90 [ 2852.503717] ? fput+0x20/0x20 [ 2852.504354] sget_fc+0x13e/0x750 [ 2852.505032] ? set_anon_super+0xc0/0xc0 [ 2852.505837] ? rpc_kill_sb+0x1b0/0x1b0 [ 2852.506614] get_tree_keyed+0x55/0x210 [ 2852.507397] vfs_get_tree+0x8e/0x300 [ 2852.508182] path_mount+0x13be/0x20b0 [ 2852.508955] ? strncpy_from_user+0x9e/0x470 [ 2852.509826] ? finish_automount+0xa90/0xa90 [ 2852.510699] ? getname_flags.part.0+0x1dd/0x4f0 [ 2852.511651] __x64_sys_mount+0x282/0x300 [ 2852.512478] ? copy_mnt_ns+0xa00/0xa00 [ 2852.513266] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2852.514314] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2852.515361] do_syscall_64+0x33/0x40 [ 2852.516119] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2852.517147] RIP: 0033:0x7f508b208b19 [ 2852.517891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2852.521571] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2852.523083] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2852.524514] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2852.525938] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2852.527369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2852.528797] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:22:52 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x300000000000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:22:52 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x20000000, 0x0) 10:22:52 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, r0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) fcntl$getown(r1, 0x9) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000240)=ANY=[@ANYBLOB="000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000900000006000000010400000000000007000000000000000100000000000000010000000000000000000000000000000000000000000000000000000000000001000000060000007f000000000000000100000000000000001000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f8000000000000000000000000000000000000429375ff61b94b7c0e00"/576]) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x72, 0x4, 0x20, 0x9, 0x0, 0x7, 0x1008, 0xa, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffc01, 0x0, @perf_config_ext={0xfc65, 0x7}, 0x0, 0x4, 0x5, 0x1, 0x8, 0xb2, 0x3, 0x0, 0x3, 0x0, 0xf3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x8) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) fcntl$getownex(r1, 0x10, &(0x7f00000004c0)) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x2) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000180)) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000100)={0xfff7, 0x7, 0x2, 0xf232, 0x17, "1619b4641da145ad"}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000140)={0xc0, 0x55, 0x6, 0x2, 0x100}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) 10:22:52 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x3801000000000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:22:52 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x3f00000000000000, 0x0) 10:22:52 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x1600000000000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:22:52 executing program 4: mount(0x0, &(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x11010e5, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0/../file0\x00'}) setsockopt$inet6_buf(r2, 0x29, 0x6, &(0x7f0000000080)="37bb5dcf77d5", 0x6) r3 = socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r4, 0x8010671f, &(0x7f0000000140)={&(0x7f00000002c0)=""/75, 0xfffffd6a}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:23:06 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 73) 10:23:06 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x4000000000000000, 0x0) 10:23:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0xfd, 0x0, 0x0, 0xfd, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfffffffffffffffc, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x5, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:23:06 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x20100000, 0x0) 10:23:06 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = getpgrp(0x0) getpriority(0x2, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0xff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="66696c74657208000010"], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b47aecec46dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:23:06 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2000000000000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:23:06 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x3f00000000000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:23:06 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001e00)=ANY=[@ANYRESDEC=r1, @ANYRESHEX=r0, @ANYBLOB="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"], 0xfdef) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f00000002c0)=ANY=[@ANYBLOB="666956524398f5194ad0fdb0d0fbf204b1e82dc724624f7a60d934d8b19d1eecc7dadd72b420dd06da294c7538000abb6bffa005904926b963dfb674d80aaa53f351d9e658b94809347a2efa"], 0x28) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42400) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r4, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) r5 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) bind$802154_dgram(r5, &(0x7f0000000100)={0x24, @none={0x0, 0x3}}, 0x14) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2866.800948] FAULT_INJECTION: forcing a failure. [ 2866.800948] name failslab, interval 1, probability 0, space 0, times 0 [ 2866.802813] CPU: 1 PID: 65340 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2866.803618] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2866.804593] Call Trace: [ 2866.804899] dump_stack+0x107/0x167 [ 2866.805321] should_fail.cold+0x5/0xa [ 2866.805760] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2866.806347] should_failslab+0x5/0x20 [ 2866.806785] kmem_cache_alloc_trace+0x55/0x320 [ 2866.807310] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2866.807897] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2866.808453] __list_lru_init+0x44d/0x890 [ 2866.808932] alloc_super+0x8b8/0xa90 [ 2866.809356] ? fput+0x20/0x20 [ 2866.809716] sget_fc+0x13e/0x750 [ 2866.810098] ? set_anon_super+0xc0/0xc0 [ 2866.810540] ? rpc_kill_sb+0x1b0/0x1b0 [ 2866.810993] get_tree_keyed+0x55/0x210 [ 2866.811445] vfs_get_tree+0x8e/0x300 [ 2866.811883] path_mount+0x13be/0x20b0 [ 2866.812346] ? strncpy_from_user+0x9e/0x470 [ 2866.812847] ? finish_automount+0xa90/0xa90 [ 2866.813336] ? getname_flags.part.0+0x1dd/0x4f0 [ 2866.813884] __x64_sys_mount+0x282/0x300 [ 2866.814339] ? copy_mnt_ns+0xa00/0xa00 [ 2866.814793] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2866.815404] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2866.816008] do_syscall_64+0x33/0x40 [ 2866.816434] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2866.817027] RIP: 0033:0x7f508b208b19 [ 2866.817461] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2866.819551] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2866.820432] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2866.821247] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2866.822058] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2866.822886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2866.823677] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:23:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000100)=0x8) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x5c, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:23:06 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0/../file0\x00', 0x80, 0x5, &(0x7f0000000780)=[{&(0x7f0000000100)=']', 0x1, 0x297}, {&(0x7f0000000500)="decfc3de78fb22b4423f7393908f9685978c3af44926a21fff437cea29bdc6aacbbcdc58b11d35954c9ed912998f07ea916d6530794de8e931f5fdab204cdccbbb11be37afa52c61ed5338c05029884ebb10938a97c74e7bc41f6155284231b6a3032cf4b98aeae05ada5f5454520ead93d8d41d4e3b8fc4c563ae17a95de7660d9a8337c47a29a150ab14db1d51a19dc766ccf5d1709468a43f9099dec48c50c310479b186431788a3060a072f394967d23a61f7dd63bedde0fba733c133af13ab45575899b8218a6cdf898d57e21802a", 0xd1, 0x8001}, {&(0x7f0000000600)="aaccbb7d6bbe441848c8112998f6886024da4cebae6bbebe029bed5de2f6d88ba4d97c64789759be808239a0d03046c1dce6acccaeb7c3a9750fb80cb94bcebc8553e1f984ad8275856d1c76a7bb102f299fb8b5972151f652d7e0dd06b640541b327fbcb7e655de3e58960f3b336b9e701ac59b71f05473417a9fbcd4ec02a225590d49b234d9f83bf4866d375594f043", 0x91, 0x800}, {&(0x7f00000006c0)="e376afc5c69d24ecacc8f12cbd5f3432d0721d432c9228b5798b3a7c12744174276bd8d80d8fabbed79d7e9690c450c75cf8946b7b5600a59d6754566b15893973752befe8420ae8e30cdc5f2f0bf1a2aa05dc6edeadfb1f087d72ad685b4d35ba2c380b8eb0c48c79bb4981da89dcb72c9e14b8761204aacc2b54203a1ff7da3c856afda57a15d524d67189ef0920660efd05475cc33cf96782b2d912b128276b76d3ad11d888d0a9b5e0aff6798851454fe4bcab2ef3c02fadbb4da83cc1", 0xbf, 0x4}, {&(0x7f0000000140)="d48ab4e5857fa97eac3dbe1efbd7ae88d22f64ded91df75ca440b68772", 0x1d}], 0x1, &(0x7f00000002c0)={[{@utf8}], [{@context={'context', 0x3d, 'root'}}]}) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:23:06 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2e000000, 0x0) 10:23:07 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x7503000000000000, 0x0) 10:23:07 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 74) 10:23:07 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2010000000000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) [ 2867.011206] FAULT_INJECTION: forcing a failure. [ 2867.011206] name failslab, interval 1, probability 0, space 0, times 0 [ 2867.014336] CPU: 0 PID: 65630 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2867.016041] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2867.018061] Call Trace: [ 2867.018708] dump_stack+0x107/0x167 [ 2867.019601] should_fail.cold+0x5/0xa [ 2867.020543] ? create_object.isra.0+0x3a/0xa20 [ 2867.021658] should_failslab+0x5/0x20 [ 2867.022584] kmem_cache_alloc+0x5b/0x310 [ 2867.023570] ? mark_held_locks+0x9e/0xe0 [ 2867.024577] create_object.isra.0+0x3a/0xa20 [ 2867.025644] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2867.026884] kmem_cache_alloc_trace+0x151/0x320 [ 2867.028044] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2867.029053] __list_lru_init+0x44d/0x890 [ 2867.030052] alloc_super+0x8b8/0xa90 [ 2867.030834] ? fput+0x20/0x20 [ 2867.031595] sget_fc+0x13e/0x750 [ 2867.032330] ? set_anon_super+0xc0/0xc0 [ 2867.033304] ? rpc_kill_sb+0x1b0/0x1b0 [ 2867.034112] get_tree_keyed+0x55/0x210 [ 2867.035058] vfs_get_tree+0x8e/0x300 [ 2867.035832] path_mount+0x13be/0x20b0 [ 2867.036776] ? strncpy_from_user+0x9e/0x470 [ 2867.037827] ? finish_automount+0xa90/0xa90 [ 2867.038872] ? getname_flags.part.0+0x1dd/0x4f0 [ 2867.040035] __x64_sys_mount+0x282/0x300 [ 2867.041023] ? copy_mnt_ns+0xa00/0xa00 [ 2867.041978] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2867.043250] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2867.044520] do_syscall_64+0x33/0x40 [ 2867.045424] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2867.046679] RIP: 0033:0x7f508b208b19 [ 2867.047455] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2867.051264] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2867.053127] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2867.054634] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2867.056147] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2867.057610] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2867.059068] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:23:07 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:23:07 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x8cffffff00000000, 0x0) 10:23:07 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x38, 0x3f7, 0x100, 0x70bd25, 0x25dfdbfd, {0x10, 0x10, './file0/../file0', './file0/../file0'}, ["", "", "", ""]}, 0x38}}, 0x40000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x392b641c3edafa38, 0x2000000000, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) mmap$perf(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x300000a, 0x100010, 0xffffffffffffffff, 0x8) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:23:19 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) open(&(0x7f0000000080)='./file0\x00', 0x6c000, 0x2) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) r3 = inotify_init() ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:23:19 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x4000000000000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:23:19 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 75) 10:23:19 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) pwritev2(r0, &(0x7f0000000880), 0x9, 0xdb3e, 0x9, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="6669827465720800000055452bef37379ca8303204542434b257b025ddd452e6e3b6c7107a34224616ad49350aacd8"], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_ASYNC_CANCEL={0xe, 0x3, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1}, 0x8) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x4e20, 0x401, @empty, 0x4}}, 0x0, 0x0, 0x4e, 0x0, "9c7b30476a9014e4429e9dae5283d2635bbe48f6f8908a9bfcb7913fa56e044c60c043ef1f00581230cd3b4baecec06dd3c1af00"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:23:19 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:23:19 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2e00000000000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:23:19 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x8f00000000000000, 0x0) 10:23:19 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2f000000, 0x0) [ 2879.841389] FAULT_INJECTION: forcing a failure. [ 2879.841389] name failslab, interval 1, probability 0, space 0, times 0 [ 2879.842700] CPU: 0 PID: 66185 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2879.843418] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2879.844279] Call Trace: [ 2879.844560] dump_stack+0x107/0x167 [ 2879.844947] should_fail.cold+0x5/0xa [ 2879.845354] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2879.845889] should_failslab+0x5/0x20 [ 2879.846283] kmem_cache_alloc_trace+0x55/0x320 [ 2879.846771] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2879.847299] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2879.847812] __list_lru_init+0x44d/0x890 [ 2879.848284] alloc_super+0x8b8/0xa90 [ 2879.848681] ? fput+0x20/0x20 [ 2879.849008] sget_fc+0x13e/0x750 [ 2879.849405] ? set_anon_super+0xc0/0xc0 [ 2879.849831] ? rpc_kill_sb+0x1b0/0x1b0 [ 2879.850240] get_tree_keyed+0x55/0x210 [ 2879.850657] vfs_get_tree+0x8e/0x300 [ 2879.851095] path_mount+0x13be/0x20b0 [ 2879.851528] ? strncpy_from_user+0x9e/0x470 [ 2879.851997] ? finish_automount+0xa90/0xa90 [ 2879.852479] ? getname_flags.part.0+0x1dd/0x4f0 [ 2879.852994] __x64_sys_mount+0x282/0x300 [ 2879.853450] ? copy_mnt_ns+0xa00/0xa00 [ 2879.853881] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2879.854453] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2879.855044] do_syscall_64+0x33/0x40 [ 2879.855451] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2879.856001] RIP: 0033:0x7f508b208b19 [ 2879.856432] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2879.858448] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2879.859240] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2879.859989] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2879.860738] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2879.861548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2879.862303] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:23:20 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2f00000000000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:23:20 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 76) 10:23:20 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x7503000000000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:23:20 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6669ec74657208000000a2f05097615768bbd2c2ac272ce36873807869fc935e14e6eba645090207445d0a1a9f6c63201182e134774275e14f100939f422a4adc04e6c4235278ac55e7d41b6a0398e4ddf"], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000040)={'filter\x00', 0x0, 0x0, 0x0, [0x5, 0x2, 0x8000, 0x9868, 0x1, 0x8001]}, &(0x7f0000000100)=0x78) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2880.031123] FAULT_INJECTION: forcing a failure. [ 2880.031123] name failslab, interval 1, probability 0, space 0, times 0 [ 2880.032585] CPU: 0 PID: 66583 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2880.033407] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2880.034288] Call Trace: [ 2880.034644] dump_stack+0x107/0x167 [ 2880.035015] should_fail.cold+0x5/0xa [ 2880.035512] ? create_object.isra.0+0x3a/0xa20 [ 2880.035977] should_failslab+0x5/0x20 [ 2880.036487] kmem_cache_alloc+0x5b/0x310 [ 2880.036903] ? mark_held_locks+0x9e/0xe0 [ 2880.037437] create_object.isra.0+0x3a/0xa20 [ 2880.037886] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2880.038553] kmem_cache_alloc_trace+0x151/0x320 [ 2880.039029] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2880.039674] __list_lru_init+0x44d/0x890 [ 2880.040104] ? __list_lru_init+0x2/0x890 [ 2880.040643] alloc_super+0x8b8/0xa90 [ 2880.041030] ? fput+0x20/0x20 [ 2880.041435] sget_fc+0x13e/0x750 [ 2880.041795] ? set_anon_super+0xc0/0xc0 [ 2880.042310] ? rpc_kill_sb+0x1b0/0x1b0 [ 2880.042723] get_tree_keyed+0x55/0x210 [ 2880.043226] vfs_get_tree+0x8e/0x300 [ 2880.043626] path_mount+0x13be/0x20b0 [ 2880.044139] ? strncpy_from_user+0x9e/0x470 [ 2880.044600] ? finish_automount+0xa90/0xa90 [ 2880.045159] ? getname_flags.part.0+0x1dd/0x4f0 [ 2880.045652] __x64_sys_mount+0x282/0x300 [ 2880.046180] ? copy_mnt_ns+0xa00/0xa00 [ 2880.046588] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2880.047271] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2880.047826] do_syscall_64+0x33/0x40 [ 2880.048268] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2880.048815] RIP: 0033:0x7f508b208b19 [ 2880.049198] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2880.051122] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2880.051889] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2880.052610] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2880.053323] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2880.054035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2880.054745] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:23:20 executing program 0: prctl$PR_SVE_GET_VL(0x33, 0x41b7) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffff47}, 0x40004, 0xbed}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) clone3(&(0x7f00000002c0)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000140)={'\x00', 0x0, 0x100, 0xb91, 0xfffffffffffffffe}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x220004, &(0x7f0000000140)=ANY=[]) socket$inet(0x2, 0x3, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x6767) prctl$PR_SVE_GET_VL(0x33, 0x2a7c) prctl$PR_SVE_GET_VL(0x33, 0x7d93) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:23:20 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x3f000000, 0x0) 10:23:34 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x8cffffff00000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:23:34 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xb903000000000000, 0x0) 10:23:34 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x40000000, 0x0) 10:23:34 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 77) 10:23:34 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x3f00000000000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:23:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0/file0\x00') 10:23:34 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) open_by_handle_at(r0, &(0x7f0000000100)=@reiserfs_2={0x8, 0x2, {0x80000001, 0xd5}}, 0x646142) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x79}}, './file0/../file0\x00'}) io_uring_enter(r4, 0x7c85, 0xfd1d, 0x2, &(0x7f0000000080)={[0x7]}, 0x8) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:23:34 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xe5, 0x1, 0x0, 0x0, 0x0, 0x200000000000}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x8) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0xfdef) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r5, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/66, 0x42}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2894.731955] FAULT_INJECTION: forcing a failure. [ 2894.731955] name failslab, interval 1, probability 0, space 0, times 0 [ 2894.733613] CPU: 1 PID: 66837 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2894.734436] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2894.735409] Call Trace: [ 2894.735726] dump_stack+0x107/0x167 [ 2894.736153] should_fail.cold+0x5/0xa [ 2894.736610] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2894.737206] should_failslab+0x5/0x20 [ 2894.737662] kmem_cache_alloc_trace+0x55/0x320 [ 2894.738193] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2894.738775] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2894.739339] __list_lru_init+0x44d/0x890 [ 2894.739821] alloc_super+0x8b8/0xa90 [ 2894.740252] ? fput+0x20/0x20 [ 2894.740638] sget_fc+0x13e/0x750 [ 2894.741032] ? set_anon_super+0xc0/0xc0 [ 2894.741521] ? rpc_kill_sb+0x1b0/0x1b0 [ 2894.741981] get_tree_keyed+0x55/0x210 [ 2894.742445] vfs_get_tree+0x8e/0x300 [ 2894.742915] path_mount+0x13be/0x20b0 [ 2894.743388] ? strncpy_from_user+0x9e/0x470 [ 2894.743918] ? finish_automount+0xa90/0xa90 [ 2894.744449] ? getname_flags.part.0+0x1dd/0x4f0 [ 2894.745008] __x64_sys_mount+0x282/0x300 [ 2894.745481] ? copy_mnt_ns+0xa00/0xa00 [ 2894.745981] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2894.746612] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2894.747227] do_syscall_64+0x33/0x40 [ 2894.747695] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2894.748340] RIP: 0033:0x7f508b208b19 [ 2894.748785] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2894.751009] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2894.751904] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2894.752799] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2894.753638] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2894.754486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2894.755345] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:23:34 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 78) 10:23:34 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x40020000, 0x0) 10:23:35 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0x0, 0x0, 0x7f, 0x6}, 0x0, 0x6, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="66030000001f00000800"], 0x28) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x2, 0x0}}, 0x1) r1 = socket$netlink(0x10, 0x3, 0xb) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, r1) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x100102, 0x0) r4 = creat(&(0x7f0000000200)='./file0/../file0\x00', 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000500)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="02400000000000002e2f4c403413300064b9159dd693f7ccc2a3fcf764b8d0ffd24ceb797365d92a3afb78af082bb54835c989caa46b801a273a40d74613b34c0441417cbe81fc744abc7f43a4bacabc7713257a2e33882b109e07ffccc21cbf6eb7336a7a721e1c40e03f10c534fc921e0f6654a07a8bb7a08ea5e9bd8e892121e7f0f35e1319091b0ed715929928bd8d7f642186d7c0ab30e90dcd4cbbec775b14d72e90fe1379d33d2448e0b73a16"]) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x9, 0xfffffffffffffccd, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:23:35 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x4000000000000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:23:35 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) [ 2894.924048] FAULT_INJECTION: forcing a failure. [ 2894.924048] name failslab, interval 1, probability 0, space 0, times 0 [ 2894.925793] CPU: 1 PID: 67247 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2894.926564] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2894.927520] Call Trace: [ 2894.927807] dump_stack+0x107/0x167 [ 2894.928221] should_fail.cold+0x5/0xa [ 2894.928677] ? create_object.isra.0+0x3a/0xa20 [ 2894.929201] should_failslab+0x5/0x20 [ 2894.929637] kmem_cache_alloc+0x5b/0x310 [ 2894.930099] create_object.isra.0+0x3a/0xa20 [ 2894.930593] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2894.931159] kmem_cache_alloc_trace+0x151/0x320 [ 2894.931673] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2894.932225] __list_lru_init+0x44d/0x890 [ 2894.932697] alloc_super+0x8b8/0xa90 [ 2894.933120] ? fput+0x20/0x20 [ 2894.933471] sget_fc+0x13e/0x750 [ 2894.933852] ? set_anon_super+0xc0/0xc0 [ 2894.934291] ? rpc_kill_sb+0x1b0/0x1b0 [ 2894.934715] get_tree_keyed+0x55/0x210 [ 2894.935153] vfs_get_tree+0x8e/0x300 [ 2894.935566] path_mount+0x13be/0x20b0 [ 2894.935981] ? getname_flags.part.0+0x115/0x4f0 [ 2894.936517] ? finish_automount+0xa90/0xa90 [ 2894.936999] ? getname_flags.part.0+0x1dd/0x4f0 [ 2894.937559] __x64_sys_mount+0x282/0x300 [ 2894.938030] ? copy_mnt_ns+0xa00/0xa00 [ 2894.938461] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2894.939047] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2894.939627] do_syscall_64+0x33/0x40 [ 2894.940045] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2894.940620] RIP: 0033:0x7f508b208b19 [ 2894.941027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2894.943054] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2894.943887] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2894.944682] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2894.945469] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2894.946260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2894.947067] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:23:35 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x8f00000000000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:23:35 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYRES64=r2, @ANYBLOB="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"], 0x28) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x400, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000080), 0x4) r5 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x501143, 0x19) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r5, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:23:35 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x4e02000000000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:23:35 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xbd02000000000000, 0x0) 10:23:35 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x109000, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0xff, 0x401, 0x398}) r1 = signalfd4(r0, &(0x7f0000000100)={[0x81]}, 0x8, 0xc0800) ioctl$FS_IOC_READ_VERITY_METADATA(r1, 0xc0286687, &(0x7f0000000240)={0x2, 0x5, 0x7d, &(0x7f0000000180)=""/125}) unlinkat(r1, &(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:23:35 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xb903000000000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:23:35 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x75030000, 0x0) 10:23:35 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x6502000000000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:23:49 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 79) 10:23:49 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x8cffffff, 0x0) 10:23:49 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x7503000000000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:23:49 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) getsockopt$IP_SET_OP_GET_BYNAME(r1, 0x1, 0x53, &(0x7f0000000100)={0x6, 0x7, 'syz0\x00'}, &(0x7f0000000140)=0x28) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="66696c74654f88000000"], 0x28) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x84000) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) r4 = fcntl$dupfd(r3, 0x406, r2) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r4, 0x80489439, &(0x7f0000000040)) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0/../file0/file0\x00', &(0x7f00000000c0)='nfsd\x00', 0x2080, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:23:49 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xe903000000000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:23:49 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xe903000000000000, 0x0) 10:23:49 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000040)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:23:49 executing program 0: setresuid(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = getpgrp(0x0) getpriority(0x2, r0) stat(&(0x7f0000000180)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) r2 = getpgrp(0xffffffffffffffff) stat(&(0x7f0000000180)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) getresgid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)=0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000340)="ff38dd25b0078f942f26b97f47dd9d413b20f8d9d12dca850e55c6e31630a400705aea1dab39c944357abdd59dc34bff40e3dd58ef17e62f5b59c0fd35103bff165f9d4d20df88af37fc2952d585fbd3b31db4cf10a657bd747591e0a9943ef10d72c1bb81", 0x65}, {&(0x7f00000003c0)="8b98ba31204f67061e92f3116ab6ea43eb6027b90c7e384cb875527ad00564890018a01f2c3dae92e6a4e7d0e50c480f73c34a4a0a0d3b72e03c3b75c49134e0475271f015653f219b0ee1f92fb12617d849d170ff2fad5e692af7c5a68610e6c1df97bffac117b2a7fe91293c333685e0c64dd4e9dfc6", 0x77}], 0x2, &(0x7f00000006c0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r1, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}], 0xa0, 0x20000004}, 0x0) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r5, 0x1276, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000240)={{{@in=@local, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in6=@private0}}, &(0x7f0000000100)=0xe8) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000003, 0x1010, r6, 0x54d79000) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) [ 2909.481931] FAULT_INJECTION: forcing a failure. [ 2909.481931] name failslab, interval 1, probability 0, space 0, times 0 [ 2909.484403] CPU: 0 PID: 67800 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2909.485861] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2909.487579] Call Trace: [ 2909.488118] dump_stack+0x107/0x167 [ 2909.488897] should_fail.cold+0x5/0xa [ 2909.489692] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2909.490744] should_failslab+0x5/0x20 [ 2909.491520] kmem_cache_alloc_trace+0x55/0x320 [ 2909.492457] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2909.493489] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2909.494483] __list_lru_init+0x44d/0x890 [ 2909.495311] alloc_super+0x8b8/0xa90 [ 2909.496068] ? fput+0x20/0x20 [ 2909.496719] sget_fc+0x13e/0x750 [ 2909.497398] ? set_anon_super+0xc0/0xc0 [ 2909.498204] ? rpc_kill_sb+0x1b0/0x1b0 [ 2909.498988] get_tree_keyed+0x55/0x210 [ 2909.499771] vfs_get_tree+0x8e/0x300 [ 2909.500556] path_mount+0x13be/0x20b0 [ 2909.501332] ? strncpy_from_user+0x9e/0x470 [ 2909.502205] ? finish_automount+0xa90/0xa90 [ 2909.503075] ? getname_flags.part.0+0x1dd/0x4f0 [ 2909.504024] __x64_sys_mount+0x282/0x300 [ 2909.504854] ? copy_mnt_ns+0xa00/0xa00 [ 2909.505645] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2909.506699] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2909.507746] do_syscall_64+0x33/0x40 [ 2909.508515] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2909.509547] RIP: 0033:0x7f508b208b19 [ 2909.510328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2909.514025] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2909.515627] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2909.517077] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2909.518509] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2909.519944] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2909.521382] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:24:02 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xf0ffffff00000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:24:02 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4000007f}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fallocate(r0, 0x41, 0x94ae, 0x1) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000100)=ANY=[@ANYBLOB="66696c647a7208000fb4085213301d4f04"], 0x28) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x200000, 0x100) connect$inet(r3, &(0x7f0000000080)={0x2, 0x4e22, @multicast2}, 0x10) r4 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet6_mreq(r4, 0x29, 0x1c, &(0x7f0000000340)={@private1, 0x0}, &(0x7f0000000380)=0x14) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000500)={@rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0xd}, r5}, 0xc) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r4, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_open_dev$usbmon(&(0x7f0000000140), 0x10000000000003, 0x4000) fstat(r3, &(0x7f00000002c0)) 10:24:02 executing program 2: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000340)={&(0x7f0000001e00)={0xfac, 0x0, 0x4, 0x70bd28, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r0}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_FRAME={0x47c, 0x33, @data_frame={@qos_ht={{{@type01={{0x0, 0x2, 0xc, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1}, {0x7fc0}, @device_a, @initial, @broadcast, {0x2, 0xfe0}}, {0x8, 0x1, 0x2, 0x0, 0xff}}, {@type10={{0x0, 0x2, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1}, {0x8}, @from_mac, @device_b, @initial, {0x6}}, {0x6, 0x1, 0x0, 0x1, 0x2}}}, @ver_80211n={0x0, 0x3, 0x1, 0x3, 0x0, 0x2}}, @random="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"}}, @NL80211_ATTR_FRAME={0x684, 0x33, @data_frame={@no_qos=@type00={{0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1}, {0x7}, @device_a, @device_b, @from_mac, {0x7, 0xb03}}, @random="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"}}, @NL80211_ATTR_FRAME={0x34, 0x33, @mgmt_frame=@deauth={@with_ht={{{0x0, 0x0, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1}, {}, @device_b, @device_a, @from_mac, {0x0, 0x4}}, @ver_80211n={0x0, 0x80, 0x2, 0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}}, 0x2f, @val={0x8c, 0x10, {0x3e, "2130dcd255b8", @short="1ea6e9bd03578d20"}}}}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0x411, 0x33, @mgmt_frame=@probe_response={@with_ht={{{0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1}, {0x1}, @device_a, @device_a, @random="58a94bf59b6b", {0x1, 0x4}}, @ver_80211n={0x0, 0x53, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}}, 0x805f, @default, 0x3880, @val={0x0, 0x6, @default_ap_ssid}, @void, @void, @void, @val={0x6, 0x2, 0x4}, @val={0x2d, 0x1a, {0x800, 0x1, 0x7, 0x0, {0x80000000, 0x2, 0x0, 0x21e}, 0x800, 0xfffffff7, 0x3f}}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x2b, 0x8}}, [{0xdd, 0x85, "d9ef0a5c1c754471f2b4d9a2f03876007da5cf20aee766546971bc153f5cbedef3e608e15edfa59b2c4a063dfa0ffe0a0214ea82e3c5989d81ed58884fede500177a9144641db7740e29b6ebcaf0b02c4a89e12f0feacfcf1289b07f806757ef3452d3229dd8c3aa6ce5d7129963b06bc8b503ea7abd6d625256d8f710254e78d884eb2baa"}, {0xdd, 0x40, "b4bd606c79ee5cce8a9a35c58585f4e31e55c75455c57795a3241c3ba1819c1f49c7f021199534fb09e64ed38d6f48079077b7d8a20343a478bebf01000100f5"}, {0xdd, 0xbc, "725d9388d64e06f5f169bd8eeafc157adebf83179a6cc5d06c6cb76edec9638be6b1de6a7ceafbc975b4d81a2e6d69ada1708bfddc9344105237e954b605d456a114819fb913f3d534f2d67c176f1d34b6f2e8e87b357cb0f0c71dbff660f212015817b8ce8453ea4adc35f0da730a0808fbe60e6d62c27b4f7a2803d18d9e2ce6a9a153c7d312a222bc9690caa24f3e08ff81d1d867b91a9e1f7250713cd52b392a73d319fe7f08417380a0fa163f6ff8f8c19358f1658bf2da9815"}, {0xdd, 0xb9, "95d5b1fb1617ae47f243aa970e75b097da28291f43ffd3b387eb7dcf2e7591885275c7eef176b71dd390ac14c3f90abbabe8bd60baafb0e81c85108c6eee86053431fbfae223c173731b0ca45b23193d59f537c3c8f83474d8369b468339a6f02b01af739e4685e34af5f97c7f9170f56a19aa1008d4b0be974b15c1e61cd536f9819a218511e719aa7b410524734b5682ca8d8425af448338d202ea2efe0e601530e52a1a04216e6e21e059519db0f478c6d57281690aa75a"}, {0xdd, 0x77, "2cbc39aa457a43c532e8e70cd6ecff52f96e6b770f3c88e7cb217dd718181c9d666abaadab5b7d43f3c48d415c0bd69572cd160bf5da2191c73d8bba94489e315e93e01f21ced89e5dbfa3f7a28501d8a31761223d789a4998980507d042318f9726ef42dc3e46e1935228899e52db2efc79ff72b7625f"}, {0xdd, 0xef, "00689d54f80403f74cdddd48c0810a279487fab6e9c1f836a389efaeef695d3479996b83405b1d34a7046804a731f37db695e15224f81503d3dcb6b187a357bd9bfd79ee1916b821126016ceb934762699d15924bb5ec977938c0f9b84ddc5fecfa7fdfbe118fb6168d2c8e05e165b74b53a75a29090d52a13893ed4b4fcc486caf1dadad94e371b013bda2aa43fee6b64d41c0fedc5619926e74cb60540a2c52cf85e0dd65308ff43c11823bd28a1df14530b0bef98b4d587ef639d4366bf28403d312328958cd3c0290d4ef1d95f4b907605707d8e0cd29ee9281cb5e60bc0811e471cae04aa31b68d08e719ee11"}]}}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0xfac}, 0x1, 0x0, 0x0, 0x40}, 0x48000) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000086"], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000580)={0x1b0f, 0x20, 0x8}) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="1900000017010010002e2f66696c65304f2e2e2f66696c6530"], 0x19) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/pata_oldpiix', 0x321300, 0x74) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='xfrm0\x00', 0x10) 10:24:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x4, @private0, 0x3}, 0x1c) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) 10:24:02 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xf0ffffff00000000, 0x0) 10:24:02 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x8cffffff00000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:24:02 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x8f000000, 0x0) 10:24:02 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 80) 10:24:02 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x8f00000000000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:24:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffff80, 0x0, 0x18000000000, 0x0, 0x260}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000040)=""/75, 0x4b) [ 2922.820987] FAULT_INJECTION: forcing a failure. [ 2922.820987] name failslab, interval 1, probability 0, space 0, times 0 [ 2922.823961] CPU: 0 PID: 68237 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2922.825401] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2922.827111] Call Trace: [ 2922.827659] dump_stack+0x107/0x167 [ 2922.828413] should_fail.cold+0x5/0xa [ 2922.829219] ? create_object.isra.0+0x3a/0xa20 [ 2922.830167] should_failslab+0x5/0x20 [ 2922.830939] kmem_cache_alloc+0x5b/0x310 [ 2922.831766] ? mark_held_locks+0x9e/0xe0 [ 2922.832595] create_object.isra.0+0x3a/0xa20 [ 2922.833507] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2922.834546] kmem_cache_alloc_trace+0x151/0x320 [ 2922.835499] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2922.836495] __list_lru_init+0x44d/0x890 [ 2922.837333] alloc_super+0x8b8/0xa90 [ 2922.838097] ? fput+0x20/0x20 [ 2922.838748] sget_fc+0x13e/0x750 [ 2922.839433] ? set_anon_super+0xc0/0xc0 [ 2922.840240] ? rpc_kill_sb+0x1b0/0x1b0 [ 2922.841030] get_tree_keyed+0x55/0x210 [ 2922.841819] vfs_get_tree+0x8e/0x300 [ 2922.842594] path_mount+0x13be/0x20b0 [ 2922.843372] ? strncpy_from_user+0x9e/0x470 [ 2922.844238] ? finish_automount+0xa90/0xa90 [ 2922.845156] ? getname_flags.part.0+0x1dd/0x4f0 [ 2922.846125] __x64_sys_mount+0x282/0x300 [ 2922.846960] ? copy_mnt_ns+0xa00/0xa00 [ 2922.847762] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2922.848835] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2922.849880] do_syscall_64+0x33/0x40 [ 2922.850637] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2922.851672] RIP: 0033:0x7f508b208b19 [ 2922.852426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2922.856144] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2922.857687] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2922.859121] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2922.860556] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2922.862000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2922.863434] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:24:03 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x5, &(0x7f0000000480)=[{&(0x7f0000000100)="9502d699204356e540bd86217f91124faf0fad8a97cb3eadbed882eba15f4bdc23129ad2be92e8e68fbdf00b21004c25d6713b1d5167a28337fd70bbaad5cc082cf34426acca0b1c7f4cae73261520be85994195caa490a9d740ef9fdc6d4bc90fa7ad5eb804b6f03b688b03b8501c24cb4dee56f66f408307b876c580ed3532400b64991369c3f7f71563ef460e1599fcb414e4c3789915e01c3e55a773297bb4d13f1fccc75f1c36c6609f090a70616b8e6e4640bc7784d946481338415a5eb4f39996f4632b2b165191000a55c63f47a80690c9f3aaae4f935cd65152a7e2cbd2", 0xe2, 0x7ff}, {&(0x7f0000000240)="eaeddfd5aa73afbaf4bd56b7070711e446dcc87c699dce7fdb910b13cf3344b904ae871c884962b17f47e5532492f5387831145ece91967d734e19ff5e037cc7cc3bfaad5144963fc6d99d11b3c9713d8bbab01b0d873029e7e6e8a3dccc72bcb2bc0505b90ea31678adbbb70ca7903ea65272ecb7647bc222f0712fd6185269419ba1eab2ee1a0da0", 0x89, 0x8001}, {&(0x7f0000000300)="595aff55c2efc8f4cac7ad1d087c64c2137bbe40ac750f38687c0ef4bf4002cfd51b4231590df1bd34bb8ee46e6ea1e00393220fec6f", 0x36, 0x78}, {&(0x7f0000000340)="c0d7d604990fd1b4ce0508303e8286a684a2", 0x12, 0xffff}, {&(0x7f0000000380)="9e74c52eeaa139876cbd3ca43285f714a5f76dd3b86205075c1f9b343be2140fba8f1e61be58fe8eea311663d8ccb0e14a1a8062edec47694d1f443d9fc0276d61f03602cc1b383b18048c416aa5d8452007f9fb45905845201708603e61a5b5bdbeb110e87e3150c38f80a489b845e956ee3f4d5dc250724f9310454dd520f15960692e2fbd10e89bbce53d37bc03a0f7ca2db2bd3865c19bc711065aed2e1feeaf9b3e0aa0e67d0dc488edcb33e8bc66331efd2583837e317191df412f964dfeaa8dc4263a8e1ba7b285d221d94485fb5aa2336717f094a0db72eed8954ede92cfd40d4a0f2b", 0xe7}], 0x20001, &(0x7f0000000500)={[{@prjquota}, {@jqfmt_vfsv1}, {@errors_continue}, {@jqfmt_vfsv1}, {@sysvgroups}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x20}}, {}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}, {@nodelalloc}], [{@fsuuid={'fsuuid', 0x3d, {[0x7, 0x65, 0x31, 0x30, 0x39, 0x30, 0x33, 0x32], 0x2d, [0x36, 0x62, 0x33, 0x36], 0x2d, [0x33, 0xc37b200a17ec6971, 0x37, 0x30], 0x2d, [0x31, 0x30, 0x38, 0x65], 0x2d, [0x33, 0x30, 0x37, 0x66, 0x37, 0x34, 0x55, 0x31]}}}, {@audit}, {@obj_role={'obj_role', 0x3d, 'rpc_pipefs\x00'}}, {@obj_type={'obj_type', 0x3d, 'rpc_pipefs\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0xffffffff}}]}) 10:24:03 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xb903000000000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:24:03 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000040)='./file0/../file0\x00', 0x3a1200, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x4e20, 0x41, @remote, 0x7a}}, 0x0, 0x0, 0x33, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:24:03 executing program 4: prctl$PR_GET_SECUREBITS(0x1b) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:24:03 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x9a020000, 0x0) 10:24:03 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xf6ffffff00000000, 0x0) 10:24:16 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xf6ffffff00000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:24:16 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xe903000000000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) [ 2936.222171] FAULT_INJECTION: forcing a failure. [ 2936.222171] name failslab, interval 1, probability 0, space 0, times 0 [ 2936.223598] CPU: 1 PID: 68982 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2936.224384] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2936.225336] Call Trace: [ 2936.225648] dump_stack+0x107/0x167 [ 2936.226071] should_fail.cold+0x5/0xa [ 2936.226508] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2936.227092] should_failslab+0x5/0x20 [ 2936.227526] kmem_cache_alloc_trace+0x55/0x320 [ 2936.228055] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2936.228639] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2936.229204] __list_lru_init+0x44d/0x890 [ 2936.229673] alloc_super+0x8b8/0xa90 [ 2936.230106] ? fput+0x20/0x20 [ 2936.230465] sget_fc+0x13e/0x750 [ 2936.230862] ? set_anon_super+0xc0/0xc0 [ 2936.231322] ? rpc_kill_sb+0x1b0/0x1b0 [ 2936.231772] get_tree_keyed+0x55/0x210 [ 2936.232213] vfs_get_tree+0x8e/0x300 [ 2936.232660] path_mount+0x13be/0x20b0 [ 2936.233132] ? strncpy_from_user+0x9e/0x470 [ 2936.233645] ? finish_automount+0xa90/0xa90 [ 2936.234169] ? getname_flags.part.0+0x1dd/0x4f0 [ 2936.234715] __x64_sys_mount+0x282/0x300 [ 2936.235216] ? copy_mnt_ns+0xa00/0xa00 [ 2936.235680] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2936.236316] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2936.236920] do_syscall_64+0x33/0x40 [ 2936.237378] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2936.237998] RIP: 0033:0x7f508b208b19 [ 2936.238451] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2936.240651] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2936.241555] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2936.242414] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2936.243234] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2936.244099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2936.244936] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:24:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x300, 0x1) openat(r0, &(0x7f0000000080)='./file0\x00', 0x22000, 0x10) 10:24:16 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) sendfile(r0, r0, &(0x7f0000000080)=0x7f, 0xb19) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='veth0_virt_wifi\x00', 0x10) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x19) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) connect(0xffffffffffffffff, &(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e22, 0x4, @private0, 0xc241}}, 0x80) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:24:16 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xa5020000, 0x0) 10:24:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 81) 10:24:16 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xfeffffff00000000, 0x0) 10:24:16 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001980)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000005c0)=""/126, 0x7e}, {&(0x7f0000000640)=""/21, 0x15}, {&(0x7f0000000680)=""/95, 0x5f}, {&(0x7f0000000700)=""/93, 0x5d}, {&(0x7f0000000780)=""/24, 0x18}], 0x5}}, {{&(0x7f0000000840)=@abs, 0x6e, &(0x7f0000000a40)=[{&(0x7f00000008c0)}, {&(0x7f0000000900)=""/18, 0x12}, {&(0x7f0000000940)=""/71, 0x47}, {&(0x7f00000009c0)=""/85, 0x55}], 0x4, &(0x7f0000000b40)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}], 0x78}}, {{&(0x7f0000000c00), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000c80)=""/236, 0xec}, {&(0x7f0000000d80)=""/98, 0x62}, {&(0x7f0000000e00)=""/129, 0x81}, {&(0x7f0000000ec0)=""/121, 0x79}, {&(0x7f0000000f40)=""/175, 0xaf}], 0x5, &(0x7f0000001080)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}}, {{&(0x7f0000001100), 0x6e, &(0x7f0000001540)=[{&(0x7f0000001180)=""/119, 0x77}, {&(0x7f0000001200)=""/218, 0xda}, {&(0x7f0000000a80)=""/30, 0x1e}, {&(0x7f0000001300)=""/8, 0x8}, {&(0x7f0000001340)=""/202, 0xca}, {&(0x7f0000001440)=""/11, 0xb}, {&(0x7f0000001480)=""/191, 0xbf}], 0x7, &(0x7f00000015c0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x78}}, {{&(0x7f0000001640)=@abs, 0x6e, &(0x7f00000016c0)}}, {{&(0x7f0000001700)=@abs, 0x6e, &(0x7f0000001880)=[{&(0x7f0000001780)=""/92, 0x5c}, {&(0x7f0000001800)=""/85, 0x55}], 0x2, &(0x7f00000018c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb0}}], 0x6, 0x40000001, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="f42312000000baf73cdca400000000000000000092d2eea41437e4574dd8c1dc0555a368f247c96eb4a2264d1f0b15c33d216bcf2988928ad46361ced5b23ff675c318c949ca18679fb681b89f946c41201d11a2fad4f7e95819fea2b61c02eb92ed02fd0cd6b583a89de46d4c65d2"], 0x28) r3 = getpgrp(0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xb3, 0x5, 0x9, 0x2, 0x0, 0x1, 0x2016, 0xa, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x10001, 0x0, @perf_config_ext={0x1, 0x4}, 0x40, 0x0, 0x6, 0x1, 0x1, 0x80000000, 0x6, 0x0, 0x1000, 0x0, 0x5}, r3, 0xe, 0xffffffffffffffff, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) syz_open_dev$sg(&(0x7f0000000340), 0xca, 0x40000) fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r5, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) ioctl$BINDER_GET_FROZEN_INFO(r1, 0xc00c620f, &(0x7f0000000300)={r0}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) getsockopt$sock_timeval(r4, 0x1, 0x57, &(0x7f0000000100), &(0x7f0000000140)=0x10) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:24:16 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xb9030000, 0x0) 10:24:16 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xf0ffffff00000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:24:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 82) 10:24:16 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xc0ed0000, 0x0) 10:24:16 executing program 0: setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040)=0x3, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:24:16 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xf6ffffff00000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) [ 2936.488862] FAULT_INJECTION: forcing a failure. [ 2936.488862] name failslab, interval 1, probability 0, space 0, times 0 [ 2936.490166] CPU: 1 PID: 69349 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2936.490907] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2936.491813] Call Trace: [ 2936.492103] dump_stack+0x107/0x167 [ 2936.492515] should_fail.cold+0x5/0xa [ 2936.492949] ? create_object.isra.0+0x3a/0xa20 [ 2936.493451] should_failslab+0x5/0x20 [ 2936.493880] kmem_cache_alloc+0x5b/0x310 [ 2936.494324] ? mark_held_locks+0x9e/0xe0 [ 2936.494778] create_object.isra.0+0x3a/0xa20 [ 2936.495252] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2936.495814] kmem_cache_alloc_trace+0x151/0x320 [ 2936.496323] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2936.496873] __list_lru_init+0x44d/0x890 [ 2936.497306] alloc_super+0x8b8/0xa90 [ 2936.497706] ? fput+0x20/0x20 [ 2936.498050] sget_fc+0x13e/0x750 [ 2936.498423] ? set_anon_super+0xc0/0xc0 [ 2936.498855] ? rpc_kill_sb+0x1b0/0x1b0 [ 2936.499283] get_tree_keyed+0x55/0x210 [ 2936.499732] vfs_get_tree+0x8e/0x300 [ 2936.500160] path_mount+0x13be/0x20b0 [ 2936.500595] ? strncpy_from_user+0x9e/0x470 [ 2936.501122] ? finish_automount+0xa90/0xa90 [ 2936.501620] ? getname_flags.part.0+0x1dd/0x4f0 [ 2936.502160] __x64_sys_mount+0x282/0x300 [ 2936.502639] ? copy_mnt_ns+0xa00/0xa00 [ 2936.503094] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2936.503719] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2936.504321] do_syscall_64+0x33/0x40 [ 2936.504754] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2936.505356] RIP: 0033:0x7f508b208b19 [ 2936.505762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2936.507885] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2936.508758] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2936.509545] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2936.510357] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2936.511170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2936.511953] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:24:16 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x0, 0x7f, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) fcntl$dupfd(r0, 0x406, r2) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:24:16 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xff03000000000000, 0x0) 10:24:16 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xfeffffff00000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:24:16 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='fi\b\x00\x00\x00\x00\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) fcntl$setown(r3, 0x8, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:24:29 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xfeffffff00000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:24:29 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) fcntl$setflags(r3, 0x2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:24:29 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fchmod(r0, 0xce) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:24:29 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xff03000000000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:24:29 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xffff1f0000000000, 0x0) 10:24:29 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x10000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x20000}, 0x3045, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x1f, 0x31, 0x4, 0x3f, 0x0, 0xfffffffffffffe01, 0x6050c, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x2, @perf_bp={&(0x7f0000000000), 0xc}, 0x60c, 0x400, 0x9, 0x6, 0x96a, 0x1, 0x8410, 0x0, 0x9, 0x0, 0x7fff}, 0x0, 0x9, r0, 0x9) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f00000002c0)=0x6, 0x4) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xe8}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x2, 0x1, 0x80, 0x48, 0x0, 0x9, 0x82010, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x1, @perf_config_ext={0x2cd6, 0x6ff8}, 0x10000, 0x7, 0x800, 0x2, 0x1, 0x7, 0x3e10, 0x0, 0x10001, 0x0, 0x4}, 0xffffffffffffffff, 0xe, r2, 0xa) r3 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f0000005c40)={{r4, 0x0, 0x0, 0x7fff, 0x4, 0x8, 0x5, 0x20, 0xfffff7e4, 0x1ff, 0x6, 0x10000, 0x2, 0x9, 0x800}}) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000300)={r4, 0x2}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) r6 = fsmount(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x32, 0x4, 0x20, 0x0, 0x9, 0x110, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000140)}, 0x1002, 0x200, 0x5, 0x3, 0x7ff, 0x0, 0xeb, 0x0, 0x10001, 0x0, 0x2}, r5, 0x4, r6, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x5, 0x0, 0x0, 0x8b, 0x0) 10:24:29 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xe9030000, 0x0) 10:24:29 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 83) 10:24:29 executing program 0: r0 = accept$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs, &(0x7f0000000100)=0x6e) fallocate(r0, 0x1b, 0x6000000000000000, 0x70cd) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) creat(&(0x7f0000000140)='./file0\x00', 0x144) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, r1, 0x3) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x80200, 0x0) openat(r2, &(0x7f00000001c0)='./file0\x00', 0xa00, 0xc9) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) [ 2949.400163] FAULT_INJECTION: forcing a failure. [ 2949.400163] name failslab, interval 1, probability 0, space 0, times 0 [ 2949.402928] CPU: 1 PID: 69849 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2949.404341] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2949.406064] Call Trace: [ 2949.406610] dump_stack+0x107/0x167 [ 2949.407366] should_fail.cold+0x5/0xa [ 2949.408162] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2949.409212] should_failslab+0x5/0x20 [ 2949.409986] kmem_cache_alloc_trace+0x55/0x320 [ 2949.410916] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2949.411947] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2949.412970] __list_lru_init+0x44d/0x890 [ 2949.413797] alloc_super+0x8b8/0xa90 [ 2949.414557] ? fput+0x20/0x20 [ 2949.415187] sget_fc+0x13e/0x750 [ 2949.415866] ? set_anon_super+0xc0/0xc0 [ 2949.416672] ? rpc_kill_sb+0x1b0/0x1b0 [ 2949.417462] get_tree_keyed+0x55/0x210 [ 2949.418250] vfs_get_tree+0x8e/0x300 [ 2949.419002] path_mount+0x13be/0x20b0 [ 2949.419773] ? strncpy_from_user+0x9e/0x470 [ 2949.420647] ? finish_automount+0xa90/0xa90 [ 2949.421524] ? getname_flags.part.0+0x1dd/0x4f0 [ 2949.422471] __x64_sys_mount+0x282/0x300 [ 2949.423289] ? copy_mnt_ns+0xa00/0xa00 [ 2949.424081] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2949.425151] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2949.426198] do_syscall_64+0x33/0x40 [ 2949.426951] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2949.427982] RIP: 0033:0x7f508b208b19 [ 2949.428734] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2949.432435] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2949.433986] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2949.435415] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2949.436859] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2949.438295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2949.439735] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:24:29 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xff03000000000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:24:29 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xf0ffffff, 0x0) 10:24:29 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x4e24, 0x4, @mcast2, 0x80000000}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:24:29 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 84) 10:24:29 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xffff1f0000000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:24:29 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='vxfs\x00', 0x0, 0x0) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f0000000100)=@md5={0x1, "a70b257255bf5f0832e5ad3840f28899"}, 0x11, 0x1) [ 2949.746138] FAULT_INJECTION: forcing a failure. [ 2949.746138] name failslab, interval 1, probability 0, space 0, times 0 [ 2949.748843] CPU: 1 PID: 70268 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2949.750266] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2949.751946] Call Trace: [ 2949.752478] dump_stack+0x107/0x167 [ 2949.753224] should_fail.cold+0x5/0xa [ 2949.753993] ? create_object.isra.0+0x3a/0xa20 [ 2949.754941] should_failslab+0x5/0x20 [ 2949.755727] kmem_cache_alloc+0x5b/0x310 [ 2949.756569] ? mark_held_locks+0x9e/0xe0 [ 2949.757406] create_object.isra.0+0x3a/0xa20 [ 2949.758303] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2949.759347] kmem_cache_alloc_trace+0x151/0x320 [ 2949.760306] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2949.761327] __list_lru_init+0x44d/0x890 [ 2949.762163] alloc_super+0x8b8/0xa90 [ 2949.762938] ? fput+0x20/0x20 [ 2949.763578] sget_fc+0x13e/0x750 [ 2949.764281] ? set_anon_super+0xc0/0xc0 [ 2949.765116] ? rpc_kill_sb+0x1b0/0x1b0 [ 2949.765921] get_tree_keyed+0x55/0x210 [ 2949.766718] vfs_get_tree+0x8e/0x300 [ 2949.767486] path_mount+0x13be/0x20b0 [ 2949.768282] ? strncpy_from_user+0x9e/0x470 [ 2949.769187] ? finish_automount+0xa90/0xa90 [ 2949.770072] ? getname_flags.part.0+0x1dd/0x4f0 [ 2949.771047] __x64_sys_mount+0x282/0x300 [ 2949.771877] ? copy_mnt_ns+0xa00/0xa00 [ 2949.772678] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2949.773749] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2949.774804] do_syscall_64+0x33/0x40 [ 2949.775569] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2949.776617] RIP: 0033:0x7f508b208b19 [ 2949.777385] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2949.781130] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2949.782673] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2949.784112] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2949.785548] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2949.786982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2949.788410] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:24:44 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xffff1f0000000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:24:44 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xf6ffffff, 0x0) 10:24:44 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:24:44 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xffffff7f00000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:24:44 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0/../file1\x00'}) perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x7, 0x1, 0x8, 0x0, 0x200, 0x411, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x894, 0xffffffffffffffe9}, 0x220, 0x2, 0x8, 0xd, 0x5, 0x31, 0x8000, 0x0, 0xbcd7, 0x0, 0xfff}, 0xffffffffffffffff, 0x7, r1, 0x7) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r5 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) r6 = accept4$bt_l2cap(r5, &(0x7f0000004480), &(0x7f00000044c0)=0xe, 0x800) dup2(r6, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r4, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:24:44 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) fcntl$dupfd(r0, 0x406, r1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:24:44 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 85) 10:24:44 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xffffff7f00000000, 0x0) [ 2964.700443] FAULT_INJECTION: forcing a failure. [ 2964.700443] name failslab, interval 1, probability 0, space 0, times 0 [ 2964.703031] CPU: 0 PID: 70492 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2964.704131] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2964.705486] Call Trace: [ 2964.705910] dump_stack+0x107/0x167 [ 2964.706493] should_fail.cold+0x5/0xa [ 2964.707102] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2964.707910] should_failslab+0x5/0x20 [ 2964.708516] kmem_cache_alloc_trace+0x55/0x320 [ 2964.709262] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2964.710068] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2964.710859] __list_lru_init+0x44d/0x890 [ 2964.711540] alloc_super+0x8b8/0xa90 [ 2964.712169] ? fput+0x20/0x20 [ 2964.712714] sget_fc+0x13e/0x750 [ 2964.713297] ? set_anon_super+0xc0/0xc0 [ 2964.713965] ? rpc_kill_sb+0x1b0/0x1b0 [ 2964.714618] get_tree_keyed+0x55/0x210 [ 2964.715253] vfs_get_tree+0x8e/0x300 [ 2964.715877] path_mount+0x13be/0x20b0 [ 2964.716509] ? strncpy_from_user+0x9e/0x470 [ 2964.717253] ? finish_automount+0xa90/0xa90 [ 2964.717975] ? getname_flags.part.0+0x1dd/0x4f0 [ 2964.718756] __x64_sys_mount+0x282/0x300 [ 2964.719437] ? copy_mnt_ns+0xa00/0xa00 [ 2964.720089] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2964.720963] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2964.721851] do_syscall_64+0x33/0x40 [ 2964.722470] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2964.723316] RIP: 0033:0x7f508b208b19 [ 2964.723959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2964.726999] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2964.728255] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2964.729442] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2964.730613] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2964.731846] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2964.733030] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:24:44 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xfeffffff, 0x0) 10:24:44 executing program 0: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x8cffffff, 0x0) 10:24:44 executing program 0: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x8f00000000000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:24:44 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xff030000, 0x0) 10:24:44 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 86) 10:24:45 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xfffffffffffff000, 0x0) 10:24:45 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="6629643d2963ef8ee800"], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2964.908080] FAULT_INJECTION: forcing a failure. [ 2964.908080] name failslab, interval 1, probability 0, space 0, times 0 [ 2964.909446] CPU: 1 PID: 70916 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2964.910223] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2964.911167] Call Trace: [ 2964.911473] dump_stack+0x107/0x167 [ 2964.911899] should_fail.cold+0x5/0xa [ 2964.912330] ? create_object.isra.0+0x3a/0xa20 [ 2964.912846] ? create_object.isra.0+0x3a/0xa20 [ 2964.913373] should_failslab+0x5/0x20 [ 2964.913804] kmem_cache_alloc+0x5b/0x310 [ 2964.914265] ? mark_held_locks+0x9e/0xe0 [ 2964.914728] create_object.isra.0+0x3a/0xa20 [ 2964.915230] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2964.915817] kmem_cache_alloc_trace+0x151/0x320 [ 2964.916362] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2964.916940] __list_lru_init+0x44d/0x890 [ 2964.917443] alloc_super+0x8b8/0xa90 [ 2964.917883] ? fput+0x20/0x20 [ 2964.918249] sget_fc+0x13e/0x750 [ 2964.918644] ? set_anon_super+0xc0/0xc0 [ 2964.919104] ? rpc_kill_sb+0x1b0/0x1b0 [ 2964.919547] get_tree_keyed+0x55/0x210 [ 2964.919988] vfs_get_tree+0x8e/0x300 [ 2964.920410] path_mount+0x13be/0x20b0 [ 2964.920859] ? strncpy_from_user+0x9e/0x470 [ 2964.921365] ? finish_automount+0xa90/0xa90 [ 2964.921874] ? getname_flags.part.0+0x1dd/0x4f0 [ 2964.922426] __x64_sys_mount+0x282/0x300 [ 2964.922904] ? copy_mnt_ns+0xa00/0xa00 [ 2964.923351] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2964.923949] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2964.924532] do_syscall_64+0x33/0x40 [ 2964.924951] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2964.925531] RIP: 0033:0x7f508b208b19 [ 2964.925957] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2964.928124] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2964.929051] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2964.929918] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2964.930776] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2964.931647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2964.932504] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:24:45 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xffffff7f00000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:24:45 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1, 0x0, 0x7f, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000240)={'broute\x00', 0x0, 0x0, 0x0, [0x3, 0x6, 0x1, 0x6, 0x800, 0x2d9b]}, &(0x7f0000000080)=0x78) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:24:45 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) mount$cgroup2(0x0, &(0x7f0000000100)='./file0/../file0\x00', &(0x7f00000002c0), 0x800000, 0xfffffffffffffffc) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000600)={&(0x7f0000001080)=ANY=[@ANYBLOB="08050000", @ANYRES16=0x0, @ANYBLOB="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"], 0x508}, 0x1, 0x0, 0x0, 0x8080}, 0x200000d0) 10:24:45 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xffff1f00, 0x0) 10:24:45 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 87) 10:24:45 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xffffffff00000000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) [ 2965.114872] FAULT_INJECTION: forcing a failure. [ 2965.114872] name failslab, interval 1, probability 0, space 0, times 0 [ 2965.116691] CPU: 1 PID: 71119 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2965.117459] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2965.118368] Call Trace: [ 2965.118682] dump_stack+0x107/0x167 [ 2965.119104] should_fail.cold+0x5/0xa [ 2965.119534] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2965.120088] should_failslab+0x5/0x20 [ 2965.120501] kmem_cache_alloc_trace+0x55/0x320 [ 2965.120998] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2965.121566] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2965.122100] __list_lru_init+0x44d/0x890 [ 2965.122552] alloc_super+0x8b8/0xa90 [ 2965.122961] ? fput+0x20/0x20 [ 2965.123295] sget_fc+0x13e/0x750 [ 2965.123650] ? set_anon_super+0xc0/0xc0 [ 2965.124073] ? rpc_kill_sb+0x1b0/0x1b0 [ 2965.124483] get_tree_keyed+0x55/0x210 [ 2965.124898] vfs_get_tree+0x8e/0x300 [ 2965.125301] path_mount+0x13be/0x20b0 [ 2965.125708] ? strncpy_from_user+0x9e/0x470 [ 2965.126167] ? finish_automount+0xa90/0xa90 [ 2965.126628] ? getname_flags.part.0+0x1dd/0x4f0 [ 2965.127135] __x64_sys_mount+0x282/0x300 [ 2965.127564] ? copy_mnt_ns+0xa00/0xa00 [ 2965.127978] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2965.128534] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2965.129080] do_syscall_64+0x33/0x40 [ 2965.129484] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2965.130025] RIP: 0033:0x7f508b208b19 [ 2965.130422] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2965.132353] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2965.133158] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2965.133920] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2965.134680] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2965.135433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2965.136202] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:24:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 88) 10:24:58 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$inet(0x2, 0xa, 0x1ff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='dummy0\x00', 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:24:58 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) readlink(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)=""/85, 0x55) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:24:58 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:24:58 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xfffff000, 0x0) 10:24:58 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xfffffffffffff000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:24:58 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x6, &(0x7f0000000040), &(0x7f0000000080)=0x4) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) sendmsg$TIPC_NL_NET_SET(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000001240)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="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"], 0x5e8}, 0x1, 0x0, 0x0, 0x4008000}, 0x41) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r1, 0x40189429, &(0x7f0000000300)={0x0, 0x200, 0x21c}) 10:24:58 executing program 0: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xfeffffff, 0x0) [ 2978.430076] FAULT_INJECTION: forcing a failure. [ 2978.430076] name failslab, interval 1, probability 0, space 0, times 0 [ 2978.431794] CPU: 1 PID: 71360 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2978.432555] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2978.433692] Call Trace: [ 2978.434000] dump_stack+0x107/0x167 [ 2978.434501] should_fail.cold+0x5/0xa [ 2978.435014] ? create_object.isra.0+0x3a/0xa20 [ 2978.435629] should_failslab+0x5/0x20 [ 2978.436141] kmem_cache_alloc+0x5b/0x310 [ 2978.436697] ? mark_held_locks+0x9e/0xe0 [ 2978.437246] create_object.isra.0+0x3a/0xa20 [ 2978.437849] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2978.438534] kmem_cache_alloc_trace+0x151/0x320 [ 2978.439164] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2978.439717] __list_lru_init+0x44d/0x890 [ 2978.440149] alloc_super+0x8b8/0xa90 [ 2978.440551] ? fput+0x20/0x20 [ 2978.440884] sget_fc+0x13e/0x750 [ 2978.441263] ? set_anon_super+0xc0/0xc0 [ 2978.441703] ? rpc_kill_sb+0x1b0/0x1b0 [ 2978.442109] get_tree_keyed+0x55/0x210 [ 2978.442521] vfs_get_tree+0x8e/0x300 [ 2978.442911] path_mount+0x13be/0x20b0 [ 2978.443344] ? strncpy_from_user+0x9e/0x470 [ 2978.443800] ? finish_automount+0xa90/0xa90 [ 2978.444257] ? getname_flags.part.0+0x1dd/0x4f0 [ 2978.444748] __x64_sys_mount+0x282/0x300 [ 2978.445181] ? copy_mnt_ns+0xa00/0xa00 [ 2978.445629] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2978.446190] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2978.446771] do_syscall_64+0x33/0x40 [ 2978.447175] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2978.447717] RIP: 0033:0x7f508b208b19 [ 2978.448142] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2978.450071] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2978.450901] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2978.451659] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2978.452400] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2978.453143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2978.453940] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:24:58 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open_tree(0xffffffffffffffff, &(0x7f00000001c0)='./file0/../file0\x00', 0x1) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:24:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 89) 10:24:58 executing program 0: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6669ec74657208000000a2f05097615768bbd2c2ac272ce36873807869fc935e14e6eba645090207445d0a1a9f6c63201182e134774275e14f100939f422a4adc04e6c4235278ac55e7d41b6a0398e4ddf"], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000040)={'filter\x00', 0x0, 0x0, 0x0, [0x5, 0x2, 0x8000, 0x9868, 0x1, 0x8001]}, &(0x7f0000000100)=0x78) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2978.648917] FAULT_INJECTION: forcing a failure. [ 2978.648917] name failslab, interval 1, probability 0, space 0, times 0 [ 2978.650889] CPU: 0 PID: 71615 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2978.651950] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2978.653218] Call Trace: [ 2978.653642] dump_stack+0x107/0x167 [ 2978.654200] should_fail.cold+0x5/0xa [ 2978.654795] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2978.655581] should_failslab+0x5/0x20 [ 2978.656171] kmem_cache_alloc_trace+0x55/0x320 [ 2978.656877] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2978.657676] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2978.658427] __list_lru_init+0x44d/0x890 [ 2978.659034] alloc_super+0x8b8/0xa90 [ 2978.659608] ? fput+0x20/0x20 [ 2978.660079] sget_fc+0x13e/0x750 [ 2978.660587] ? set_anon_super+0xc0/0xc0 [ 2978.661195] ? rpc_kill_sb+0x1b0/0x1b0 [ 2978.661801] get_tree_keyed+0x55/0x210 [ 2978.662404] vfs_get_tree+0x8e/0x300 [ 2978.662964] path_mount+0x13be/0x20b0 [ 2978.663548] ? strncpy_from_user+0x9e/0x470 [ 2978.664199] ? finish_automount+0xa90/0xa90 [ 2978.664850] ? getname_flags.part.0+0x1dd/0x4f0 [ 2978.665581] __x64_sys_mount+0x282/0x300 [ 2978.666198] ? copy_mnt_ns+0xa00/0xa00 [ 2978.666793] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2978.667585] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2978.668378] do_syscall_64+0x33/0x40 [ 2978.668940] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2978.669721] RIP: 0033:0x7f508b208b19 [ 2978.670282] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2978.673053] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2978.674212] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2978.675272] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2978.676318] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2978.677424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2978.678481] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:25:11 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 90) 10:25:11 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xffffff7f, 0x0) 10:25:11 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYRES64=r0], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0xb) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e20, @loopback}}, 0x0, 0x0, 0xb, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) syz_open_procfs(0x0, &(0x7f0000000340)='net/sctp\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {0x3}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000002c0), 0x4) 10:25:11 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x9, 0x40, 0x0, 0x5, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x7f, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5246}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:25:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56fb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd450500000081334f791ea272e6797188c1445080be2c3443bbd52f50feb4293292976b27d0bb925fe3ca9b0bed093fd7"}, 0xd8) 10:25:11 executing program 0: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2f00000000000000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:25:11 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000006c0)=ANY=[@ANYBLOB="66696c746572080000007bf67a4eaeb5910f1ba49a3661459c991ed478de097575e76767531a094cd679655570888fd3bcde4fbdacd2cff0f78ceb3dcc9c8f9e1295d2361633c91e4594ac6e1ba0e82a49104e503909d7de4e17a406c8f1487f068212fed2a481ae70a0cbdabd3f55b5ee2ba67407e462abee08481d00f73291e180c3453fc77925f74f53b221ebdf631e472d9f9d2553513b5c428ec4b20087ae48861162a7635d85265e5553f170d4d83358bbd0c8cc2565e6a54735f6754e6b741cfe32c1f5d14db14e6d52fe0b5dec43c28c6da23dcfd9d8136adbde7713acd042c064c7d42bbe18a734bbc95149d8f8c928530e7bfec944f87b51f25d2dc92b40a9105e0b16749ce9ae7e9bd771f122bb3476d2435a16150abfa34bcd2a2a8fbc75aaf33a3a13234b77ca451eee49a12612be336ea0de7832fb5948ebca0e56b27cf750205ddbeabe91db0bbbbcb83d1539764e2a3446bda42bd9c3d570b10c2200172072a7f72e61dd30dfbf0ad5d54ae1f18acd511448025852a25760e751c2b9a9fba7c487f0686d0ad4b32753466b8ce53228931c22925c97"], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x440000, 0x127) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) openat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x480000, 0x82) 10:25:11 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x8a002, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='f\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x23) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x3a000, 0x139) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {0x16}, 0x0, 0xfff5, 0x0, 0x0}, 0x58) [ 2991.532378] FAULT_INJECTION: forcing a failure. [ 2991.532378] name failslab, interval 1, probability 0, space 0, times 0 [ 2991.534987] CPU: 1 PID: 71798 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2991.536365] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2991.538012] Call Trace: [ 2991.538543] dump_stack+0x107/0x167 [ 2991.539273] should_fail.cold+0x5/0xa [ 2991.540038] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2991.541056] should_failslab+0x5/0x20 [ 2991.541833] kmem_cache_alloc_trace+0x55/0x320 [ 2991.542757] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2991.543786] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2991.544778] __list_lru_init+0x44d/0x890 [ 2991.545618] alloc_super+0x8b8/0xa90 [ 2991.546372] ? fput+0x20/0x20 [ 2991.547001] sget_fc+0x13e/0x750 [ 2991.547686] ? set_anon_super+0xc0/0xc0 [ 2991.548478] ? rpc_kill_sb+0x1b0/0x1b0 [ 2991.549256] get_tree_keyed+0x55/0x210 [ 2991.550048] vfs_get_tree+0x8e/0x300 [ 2991.550797] path_mount+0x13be/0x20b0 [ 2991.551563] ? strncpy_from_user+0x9e/0x470 [ 2991.552430] ? finish_automount+0xa90/0xa90 [ 2991.553285] ? getname_flags.part.0+0x1dd/0x4f0 [ 2991.554249] __x64_sys_mount+0x282/0x300 [ 2991.555062] ? copy_mnt_ns+0xa00/0xa00 [ 2991.555854] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2991.556907] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2991.557957] do_syscall_64+0x33/0x40 [ 2991.558707] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2991.559737] RIP: 0033:0x7f508b208b19 [ 2991.560484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2991.564178] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2991.565714] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2991.567139] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2991.568567] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2991.570007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2991.571436] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:25:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) r3 = creat(&(0x7f0000000340)='./file0/../file0\x00', 0x1a8) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000600)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="00000000000000002e2f66696c6530008b094d00b4c36f01517fdadd4880dc5c92c15b6b7da0c90f8ffa866adeed62980439ec044176f4a2df4110ce87866ec995bd4a52e1c5b8e561"]) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) sendto$inet(r2, &(0x7f0000000240)="213366a143e4bc1f99bc12315ae2cd0cdc3aab6d02dbb66ff89244764a2ee7881f8604d080ed7c1ab814be060a76ae6e5210286b3daa09cb161f1abd64f48d59d2a56e2ae8293531fd63276c20aededb4bd71aa64780aeb8df1a5203ff45a4de1490ebf739ad76bfe1ccdab32b8eaaef90a83cd275b69e8bf240bff73630e300fe5a62cbe61cda2cb25f5a3546c7d40ec4ae0818c215af67", 0x98, 0x24048081, 0x0, 0x0) ioctl$AUTOFS_IOC_ASKUMOUNT(r3, 0x80049370, &(0x7f00000001c0)) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:25:11 executing program 0: ioctl$CDROM_GET_MCN(0xffffffffffffffff, 0x5311, &(0x7f0000000080)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x80) 10:25:11 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7b, 0x0, 0x2000000, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00'/10], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) r3 = socket$inet_icmp(0x2, 0x2, 0x1) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) fcntl$dupfd(r3, 0x0, r4) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:25:11 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xffffff8c, 0x0) 10:25:11 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = getpgrp(0x0) getpriority(0x2, r0) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x0, 0x3f, 0x5, 0x3c, 0x0, 0x6e, 0x40000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x400, 0x9, 0x4, 0x4, 0x5b5, 0x3ff, 0x2, 0x0, 0x8, 0x0, 0x9}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x3, 0x9, 0x0, 0x7, 0x0, 0x18195fed, 0x800, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x2000, 0x4, 0x1, 0x9, 0x6, 0x5, 0x7, 0x0, 0x1f, 0x0, 0xff}, r0, 0x7, r1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) shutdown(r2, 0x1) accept4(0xffffffffffffffff, &(0x7f0000000580)=@hci, &(0x7f00000002c0)=0x80, 0x80000) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r4, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:25:11 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, 0x0) 10:25:11 executing program 0: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0x8000, 0xc6a00) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x54, 0x0, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xffffffe0}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfffffffe}]}, 0x54}, 0x1, 0x0, 0x0, 0x800}, 0x800) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:25:11 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000500)={0x1f, {{0x2, 0x4e20, @broadcast}}}, 0x88) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0xa4000500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:25:11 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 91) 10:25:11 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xfffffff0, 0x0) 10:25:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f00000001c0)=""/49, &(0x7f0000000140)=0x31) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) [ 2991.912113] FAULT_INJECTION: forcing a failure. [ 2991.912113] name failslab, interval 1, probability 0, space 0, times 0 [ 2991.913437] CPU: 0 PID: 72474 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 2991.914189] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2991.915085] Call Trace: [ 2991.915380] dump_stack+0x107/0x167 [ 2991.915778] should_fail.cold+0x5/0xa [ 2991.916195] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 2991.916753] should_failslab+0x5/0x20 [ 2991.917170] kmem_cache_alloc_trace+0x55/0x320 [ 2991.917677] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2991.918233] __memcg_init_list_lru_node+0x7f/0x1e0 [ 2991.918785] __list_lru_init+0x44d/0x890 [ 2991.919229] alloc_super+0x8b8/0xa90 [ 2991.919645] ? fput+0x20/0x20 [ 2991.919988] sget_fc+0x13e/0x750 [ 2991.920354] ? set_anon_super+0xc0/0xc0 [ 2991.920796] ? rpc_kill_sb+0x1b0/0x1b0 [ 2991.921213] get_tree_keyed+0x55/0x210 [ 2991.921648] vfs_get_tree+0x8e/0x300 [ 2991.922072] path_mount+0x13be/0x20b0 [ 2991.922497] ? strncpy_from_user+0x9e/0x470 [ 2991.922976] ? finish_automount+0xa90/0xa90 [ 2991.923459] ? getname_flags.part.0+0x1dd/0x4f0 [ 2991.923986] __x64_sys_mount+0x282/0x300 [ 2991.924441] ? copy_mnt_ns+0xa00/0xa00 [ 2991.924870] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2991.925454] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2991.926054] do_syscall_64+0x33/0x40 [ 2991.926478] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2991.927043] RIP: 0033:0x7f508b208b19 [ 2991.927457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2991.929460] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2991.930309] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 2991.931084] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 2991.931876] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2991.932666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2991.933459] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:25:25 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x8800, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000080)={0x3, 0x0, [0x0, 0x0, 0x0]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:25:25 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000040)={'nat\x00', 0x0, 0x0, 0x0, [0xffffffffffffffe1, 0x4, 0x200, 0x4, 0x7, 0x9c88]}, &(0x7f0000000100)=0x78) mount$bind(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='./file0/../file0/../file0\x00', &(0x7f0000000300), 0x80014, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:25:25 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0/../file0\x00', 0x44) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:25:25 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 92) 10:25:25 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000a00)={@in={{0x2, 0x4e23, @rand_addr=0x64010102}}, 0x0, 0x0, 0x1032, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0x99) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000001c0)={0x2, 0x1, 0x19, 0x17, 0x113, &(0x7f0000000600)="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"}) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0/../file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:25:25 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xfffffff6, 0x0) 10:25:25 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb94}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x5, 0x1, 0x7, 0x7f, 0x0, 0x2, 0x80, 0xd, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x6, 0x1000}, 0x8084, 0xbe3, 0xffffffff, 0x6, 0x8, 0xfffffff7, 0x1000, 0x0, 0xffffffff, 0x0, 0xc1}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x9) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000340)=ANY=[@ANYRESOCT, @ANYRESHEX=r1], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x10000, 0x19) r4 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r2, 0x0, 0xfffffffffffffffe, 0x800}) fsconfig$FSCONFIG_SET_PATH(r5, 0x3, &(0x7f0000000080)='/)V\x1d^[\x00', &(0x7f0000000100)='./file0/file0\x00', r4) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:25:25 executing program 0: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xffff1f00, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3005.439039] FAULT_INJECTION: forcing a failure. [ 3005.439039] name failslab, interval 1, probability 0, space 0, times 0 [ 3005.441912] CPU: 1 PID: 72650 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 3005.443426] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3005.445222] Call Trace: [ 3005.445802] dump_stack+0x107/0x167 [ 3005.446604] should_fail.cold+0x5/0xa [ 3005.447437] ? create_object.isra.0+0x3a/0xa20 [ 3005.448420] should_failslab+0x5/0x20 [ 3005.449249] kmem_cache_alloc+0x5b/0x310 [ 3005.450136] ? mark_held_locks+0x9e/0xe0 [ 3005.451023] create_object.isra.0+0x3a/0xa20 [ 3005.451975] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3005.453069] kmem_cache_alloc_trace+0x151/0x320 [ 3005.454097] __memcg_init_list_lru_node+0x7f/0x1e0 [ 3005.455156] __list_lru_init+0x44d/0x890 [ 3005.456072] alloc_super+0x8b8/0xa90 [ 3005.456874] ? fput+0x20/0x20 [ 3005.457541] sget_fc+0x13e/0x750 [ 3005.458288] ? set_anon_super+0xc0/0xc0 [ 3005.459158] ? rpc_kill_sb+0x1b0/0x1b0 [ 3005.459988] get_tree_keyed+0x55/0x210 [ 3005.460832] vfs_get_tree+0x8e/0x300 [ 3005.461635] path_mount+0x13be/0x20b0 [ 3005.462491] ? strncpy_from_user+0x9e/0x470 [ 3005.463421] ? finish_automount+0xa90/0xa90 [ 3005.464342] ? getname_flags.part.0+0x1dd/0x4f0 [ 3005.465381] __x64_sys_mount+0x282/0x300 [ 3005.466276] ? copy_mnt_ns+0xa00/0xa00 [ 3005.467117] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3005.468256] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3005.469361] do_syscall_64+0x33/0x40 [ 3005.470184] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3005.471293] RIP: 0033:0x7f508b208b19 [ 3005.472112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3005.476084] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3005.477745] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 3005.479303] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 3005.480857] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3005.482428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3005.483983] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:25:25 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x90000, 0x125) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:25:39 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r3 = clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_open_dev$mouse(&(0x7f0000000700), 0x80, 0x84000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000900)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000008c0)={&(0x7f0000000780)={0x124, 0x39, 0x400, 0x70bd26, 0x25dfdbff, {0x4}, [@generic="5a22f96750700b3e73531282a96806dec710c9b14cd9ac26b9becc2e811b1480e3595f220131c7de942155c7f9c7f81118629a1cbbae695b401f7969fe98ce15cc7a5f68e5ea044c71ff1a2da11520c392e1ad4a63156b", @nested={0x51, 0x2d, 0x0, 0x1, [@generic="f1cb0431d7564e5a369ac2cf9c5a6eaa511b2ad2af1d9ae76739dbf2abf96a9d9848345f505fcd5a1d177eead5b7e0ae136692af9e6d47598be4d4c4e7cab84be200650e7a0ae60fc09f38d826", @generic]}, @nested={0x63, 0x5c, 0x0, 0x1, [@typed={0x8, 0x9, 0x0, 0x0, @ipv4=@broadcast}, @typed={0x8, 0x50, 0x0, 0x0, @fd=r4}, @typed={0x8, 0x54, 0x0, 0x0, @pid=r3}, @generic="75be246a7b08890d0430b7f988edd79001910240845d28f38555188e96049e5ff09240ff1879cb3a3f910001b192b8ab0399e905588aadc8ee4e1d5c9682548525edc57a54cda8"]}]}, 0x124}, 0x1, 0x0, 0x0, 0x4}, 0x44005) 10:25:39 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xfffffffe, 0x0) 10:25:39 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:25:39 executing program 0: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, 0x0) 10:25:39 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:25:39 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x2}, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:25:39 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 93) 10:25:39 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0/../file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) [ 3019.185390] FAULT_INJECTION: forcing a failure. [ 3019.185390] name failslab, interval 1, probability 0, space 0, times 0 [ 3019.188132] CPU: 1 PID: 73086 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 3019.189523] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3019.191203] Call Trace: [ 3019.191736] dump_stack+0x107/0x167 [ 3019.192476] should_fail.cold+0x5/0xa [ 3019.193242] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 3019.194273] should_failslab+0x5/0x20 [ 3019.195055] kmem_cache_alloc_trace+0x55/0x320 [ 3019.195985] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3019.197019] __memcg_init_list_lru_node+0x7f/0x1e0 [ 3019.198030] __list_lru_init+0x44d/0x890 [ 3019.198859] alloc_super+0x8b8/0xa90 [ 3019.199629] ? fput+0x20/0x20 [ 3019.200262] sget_fc+0x13e/0x750 [ 3019.200948] ? set_anon_super+0xc0/0xc0 [ 3019.201755] ? rpc_kill_sb+0x1b0/0x1b0 [ 3019.202557] get_tree_keyed+0x55/0x210 [ 3019.203352] vfs_get_tree+0x8e/0x300 [ 3019.204114] path_mount+0x13be/0x20b0 [ 3019.204896] ? strncpy_from_user+0x9e/0x470 [ 3019.205773] ? finish_automount+0xa90/0xa90 [ 3019.206660] ? getname_flags.part.0+0x1dd/0x4f0 [ 3019.207620] __x64_sys_mount+0x282/0x300 [ 3019.208448] ? copy_mnt_ns+0xa00/0xa00 [ 3019.209256] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3019.210340] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3019.211397] do_syscall_64+0x33/0x40 [ 3019.212157] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3019.213194] RIP: 0033:0x7f508b208b19 [ 3019.213957] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3019.217670] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3019.219217] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 3019.220661] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 3019.222112] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3019.223555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3019.224998] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:25:39 executing program 0: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r3, 0x0, 0x42, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) 10:25:39 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) shutdown(r1, 0x1) getpeername(r1, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:25:39 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xedc000000000, 0x0) 10:25:39 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000240)={0x0, {0x2, 0x4e24, @private=0xa010101}, {0x2, 0x4e24, @empty}, {0x2, 0x4e23, @loopback}, 0x81, 0x0, 0x0, 0x0, 0x101, &(0x7f0000000180)='macvlan0\x00', 0x9, 0x1000, 0x4}) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:25:39 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 94) 10:25:39 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x1, 0x5, 0x6, 0x22, 0x0, 0x3, 0x4c88a, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x3ff, 0x80000001}, 0x904, 0xffff, 0x2, 0x8, 0x40c, 0x2, 0x9, 0x0, 0x4, 0x0, 0x5}, 0x0, 0x3, r0, 0x8) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3019.550909] FAULT_INJECTION: forcing a failure. [ 3019.550909] name failslab, interval 1, probability 0, space 0, times 0 [ 3019.553946] CPU: 0 PID: 73509 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 3019.555355] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3019.557040] Call Trace: [ 3019.557577] dump_stack+0x107/0x167 [ 3019.558329] should_fail.cold+0x5/0xa [ 3019.559106] ? create_object.isra.0+0x3a/0xa20 [ 3019.560039] should_failslab+0x5/0x20 [ 3019.560810] kmem_cache_alloc+0x5b/0x310 [ 3019.561647] ? mark_held_locks+0x9e/0xe0 [ 3019.562486] create_object.isra.0+0x3a/0xa20 [ 3019.563382] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3019.564421] kmem_cache_alloc_trace+0x151/0x320 [ 3019.565370] __memcg_init_list_lru_node+0x7f/0x1e0 [ 3019.566365] __list_lru_init+0x44d/0x890 [ 3019.567192] alloc_super+0x8b8/0xa90 [ 3019.567955] ? fput+0x20/0x20 [ 3019.568590] sget_fc+0x13e/0x750 [ 3019.569275] ? set_anon_super+0xc0/0xc0 [ 3019.570115] ? rpc_kill_sb+0x1b0/0x1b0 [ 3019.570907] get_tree_keyed+0x55/0x210 [ 3019.571701] vfs_get_tree+0x8e/0x300 [ 3019.572459] path_mount+0x13be/0x20b0 [ 3019.573238] ? strncpy_from_user+0x9e/0x470 [ 3019.574130] ? finish_automount+0xa90/0xa90 [ 3019.575004] ? getname_flags.part.0+0x1dd/0x4f0 [ 3019.575966] __x64_sys_mount+0x282/0x300 [ 3019.576794] ? copy_mnt_ns+0xa00/0xa00 [ 3019.577589] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3019.578666] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3019.579714] do_syscall_64+0x33/0x40 [ 3019.580472] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3019.581508] RIP: 0033:0x7f508b208b19 [ 3019.582274] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3019.585985] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3019.587528] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 3019.588971] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 3019.590427] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3019.591868] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3019.593306] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:25:39 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x4000000000000, 0x0) 10:25:39 executing program 0: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xc0ed0000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:25:39 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(0xffffffffffffffff, 0xf507, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:25:39 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = getpgrp(0x0) getpriority(0x2, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) r4 = getpgrp(r0) getpgrp(r4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:25:39 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="66696c74650200000000"], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:25:54 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x8000000000000, 0x0) 10:25:54 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000600)={@in={{0x2, 0x4e22, @remote}}, 0x0, 0x0, 0x45, 0x0, "cac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:25:54 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e21, @empty}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4bc2cec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) getpriority(0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000b40)={0x7a8, 0x1d, 0x2, 0x70bd25, 0x25dfdbfc, {0xb}, [@nested={0xe3, 0x62, 0x0, 0x1, [@generic="0eeb13ff1fff0154fa2901c22f12af9ba92680a53c10a30f38a1bdf393ba7b7c54bf9254b3476cf6fb8a4bc8a9cc537d044937d68771d16b0557b33d98c251052d9da3ffaade52c1eb7ecda69a192912fa9c660b417a6a6ece903ebeebeaeb55ba600ee3332de7bc0570035444f09c1dd1e2d1892f7ab2f0168db728660ce742036d2dda8809efd036545408ff350fbf2ec1b7215e360f006e1809cf12110efd377dcf064e47276d86853f7ba0293b3cda3f5dcd45885b04c789cf897ae55156120a6909dbf2ac298e2e112dfc43e4efb34c24301102c272bae1ddecfe4c97"]}, @nested={0x148, 0x52, 0x0, 0x1, [@generic="0f433255838f43f1db1e27a888139bc4250a15664931c287b94c2d20254953ff3a3dfaec0c4645dece0184688235541463a0a4896eb62356ea944e7f0a1a79b0f4058c8859492080765b463d", @typed={0x8, 0x51, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x45, 0x0, 0x0, @pid}, @typed={0xe, 0x20, 0x0, 0x0, @binary="c57b66d697db6d6df9ba"}, @typed={0x8, 0x68, 0x0, 0x0, @pid}, @typed={0xd0, 0x80, 0x0, 0x0, @binary="d4039aac33c6331add099b2ea4fffaee6d865355777f7f614fdda0b48e61e155e614bc16b8498c2787344651c8393131913dc7585d9b8046b5b00f26cd4c891e42947f52c83dee7605bf197a00f21a5fdf3d999bf52d2a69a7d68205539bfc27f32c1da6518d3aa473123c8cb1115e47655e15fdea222d86ce37fc4d159b068c742dfd3edfd81e50e9917d17df2ceb6530d8f0879d6eefb71e0ec001d90b1c9ee2193f7d07468f1d0e49d5994231203bf3617d02481d4946666711ffbcdad0960f46bff806b4c63e014d26ec"}]}, @generic="a7782066b8300a063c133bc0c624026381fe1d13b04b8a2e06aee543bf183205cf66ba38cfa5e5bbac08ce15b2754dd0b9be16a4b76802c0fc121a8fb4262f01c360aad1ac5c6e55b56a9a8b38b943510154b25f12def8e8513f97c90c9d54275b67d42939e4754edc7d5f2eb260081eb8f00b090ffbc68bc11957e32a6c7221b6e32626d4b7d9037bbf49266beaeac4c0faaaea74916f30223ff8667b235905566e410db5d83d43232857a8c4d6c636e8e8168aaa7eb4", @nested={0x4a8, 0x73, 0x0, 0x1, [@generic="ed6f", @generic="80b79f1076e626d44fe3227ebc4996283013d344f937efbd4b3426d794572e266f3626fc31074b425ce2db10bbb4210e9adec3281f43f3c01ffd253c926cd9d7b5188c755da59641d35fa7765ca1bc345235e4ab3d4bc0044ec894479e3ffffa1c17ed7bb16465349c652f2b46bf119c94d2180415d1342bd90da7b194", @generic="f2d908f5cf2b1e4078275493a7fa1c5599094a96fd35a928992f20cc0b9947746a948eaea6039dfd8724a29c29055aaf95bda4b4ee3ed7f1a634fad4a5c886258ded5a7dd6a03954d1c130c2025bd9fd6a2dcf7ac0626a44224a878a2920d11178260d2291dca2927ef6755306a1777454ba95701c3461b62e9dc69ad14c001ff9d50f9431acff4552039d1c676f87", @typed={0x8, 0x8d, 0x0, 0x0, @str=':$!\x00'}, @generic="bf47636345688c6ed5953bfa1b2978c82a1ad85ed14f279a0e0cc067fe1c1111098fa3537298c43de5f07cfdfb1486f8f16e677835acd8d2354f2328449150215d126ae1e170203610796b7dfa82af7a02cc402a039ae133a319d8fc1b85fa6adb5b", @generic="fa2444ae90a0c486d39661dee0849ead372f915ad06e9861b6a745ace06b573a9ff559ad54a7e0acd304b7c0f34881e4b2627daa6f1a02bef896074aec63d666c5993f1ca280acd86499fea26e8c3158104398f66589bd1264bff6825c6583117110a84133aa76b9370a67a82f5ac9547df4d4826cf5783aec52c237acc2615c0d1a76ddff7c075262e36b78d755f66beb461f03cbe023702c0efb276b4b14b331248bb69f634af0a2336b6f741fa0a76991e416996b023003118f53d5988df4ace2a3afeef082beda1aef14f6fe370eef197bdcf56762", @generic="691b702ab10f5edceca579495a1701dd844834a6c11007e0575c0caa72c83cdf92551388f44b1134c0f6cc391befdca5f88f17ed3a77afaf3cd124ee465bc8a7f609553c265ae28a6475060db95965056fd9f47eab5735bc0d4728050c45e07069e7eb", @typed={0x8, 0x2e, 0x0, 0x0, @fd=r1}, @generic="b772481271acca18dcc1533616874dadaa4de28c63be663afdef174f68ffcb85dba537efdaae14b7bf2e0945595f230413b178375a344f2c9286bc0c528be7819a07d05ad61c41a733a49c3ad9b0cf685673ef7d8b428db54f5983b2956be5c4a94b99d8313fec832129e0c37ac0171cbd4b7986b69f64e731af56eea7e48e14a6b7b3431f9c82032c1e8d305e6ebee4cc797115a1d377760c5a24c0f33996a2ae002c9664941f42639cccab98ec2a9d76b5ec9807c59b410509ac2e71594473ab43ccb733373701edae88326b5fd33bec952d4d22e95ae1c1996570ce72d233b5bfb4992e524ba987628143d6601c776bcc86b2a5", @generic="5b733627153ca274b4ea4f6faba0713155adff7d99586aab3a6602e9d6f880617abba1d8d5c4be7c3f041e5025c4750d7faacf82a6a29ec1df89f9decf8681196f7f2252c63e118682be209239192ce633dc7220e2b85081c1b7aa5107ae81dba6d613286b31c112004cd9793b9ea64dacd1b6e936a6ddf66deb7f434feb77f7eac9593a8ccf3e0cf03fb86efef18cb7a9695b194f03f1a88b83b6304b72ff656fa4f5e227c95a0403d044513812ff857234c66fd4a76bbb2e64a090e1543752add311eb4c3f55bb818c4f589a38c9acd058de44bb660626165b31bc3af21152f002a5876a794fecb7c98b94b047b8bd4bdc098f21"]}, @typed={0x8, 0x75, 0x0, 0x0, @fd=r2}]}, 0x7a8}, 0x1, 0x0, 0x0, 0x4000}, 0x805) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:25:54 executing program 0: r0 = getpgrp(0x0) getpriority(0x2, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x5, 0x1, 0x80, 0x7, 0x0, 0x5, 0x4a02, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0x3d4}, 0xa040, 0x4, 0x7f, 0x8, 0x0, 0x7, 0x6, 0x0, 0x3, 0x0, 0xfffffffffffffff9}, r0, 0x7, r1, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) getpeername$unix(r3, &(0x7f0000000240)=@abs, &(0x7f0000000180)=0x6e) 10:25:54 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0xdef48666a76e0862, 0x0) perf_event_open(&(0x7f0000001d80)={0x5, 0xd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4806c, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101, 0x2}, 0x0, 0x3, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x6, 0x8, 0x0, 0x7f, 0x0, 0x7, 0x42438, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xd92, 0x2, @perf_config_ext={0x8000, 0x697b}, 0x4400, 0x9, 0x6, 0x0, 0x1, 0xffffffff, 0x8, 0x0, 0x8, 0x0, 0x45}, 0xffffffffffffffff, 0x10, r0, 0x1) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) sendmsg$SMC_PNETID_ADD(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x54, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'gretap0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x810}, 0x40808) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:25:54 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 95) 10:25:54 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x4, 0x7, 0x0, 0x2, 0x0, 0x49, 0x13c15a, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xf085, 0x2, @perf_config_ext={0x200, 0x4d}, 0x40, 0x5, 0x1, 0x7, 0x1, 0x7fffffff, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xb, r0, 0x2) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x80, 0x8, 0x81, 0x0, 0x40, 0x0, 0x7fff, 0xa0000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000100), 0x5}, 0x4000, 0x100000000, 0xffff, 0x5, 0x13c3de12, 0xfffffffe, 0x6, 0x0, 0xffff, 0x0, 0x20}, 0x0, 0x7, r0, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x402000, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1}, './file0/../file0/file0\x00'}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r4, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:25:54 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="050052a247aad0696c748150080007de"], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @private=0xa010101}, 0x10) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3034.953269] FAULT_INJECTION: forcing a failure. [ 3034.953269] name failslab, interval 1, probability 0, space 0, times 0 [ 3034.956013] CPU: 0 PID: 74052 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 3034.957406] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3034.959088] Call Trace: [ 3034.959631] dump_stack+0x107/0x167 [ 3034.960384] should_fail.cold+0x5/0xa [ 3034.961159] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 3034.962209] should_failslab+0x5/0x20 [ 3034.962985] kmem_cache_alloc_trace+0x55/0x320 [ 3034.963909] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3034.964944] __memcg_init_list_lru_node+0x7f/0x1e0 [ 3034.965943] __list_lru_init+0x44d/0x890 [ 3034.966781] alloc_super+0x8b8/0xa90 [ 3034.967546] ? fput+0x20/0x20 [ 3034.968182] sget_fc+0x13e/0x750 [ 3034.968871] ? set_anon_super+0xc0/0xc0 [ 3034.969689] ? rpc_kill_sb+0x1b0/0x1b0 [ 3034.970502] get_tree_keyed+0x55/0x210 [ 3034.971288] vfs_get_tree+0x8e/0x300 [ 3034.972053] path_mount+0x13be/0x20b0 [ 3034.972837] ? strncpy_from_user+0x9e/0x470 [ 3034.973722] ? finish_automount+0xa90/0xa90 [ 3034.974606] ? getname_flags.part.0+0x1dd/0x4f0 [ 3034.975562] __x64_sys_mount+0x282/0x300 [ 3034.976397] ? copy_mnt_ns+0xa00/0xa00 [ 3034.977199] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3034.978285] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3034.979329] do_syscall_64+0x33/0x40 [ 3034.980087] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3034.981124] RIP: 0033:0x7f508b208b19 [ 3034.981881] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3034.985606] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3034.987153] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 3034.988600] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 3034.990053] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3034.991494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3034.992948] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:25:55 executing program 0: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2f00000000000000, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:25:55 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xf0ffffffffffff, 0x0) 10:25:55 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000080)=@random={'osx.', '$@\xe6W@\xdb,:\x00'}) 10:25:55 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x77, 0xd}, 0x0, 0xf, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) r2 = signalfd(r1, &(0x7f00000001c0), 0x8) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000240), 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:25:55 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000100)='smaps\x00', &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000005c0)=ANY=[@ANYBLOB="66696c74657208000000425aade53bce68bf0a1d344b015409b3fd516c896e00000000000002d6b9b1d900863f96891af1063094faeac4582165e366605ace4f2d62eca979163e67ad2ffadedf72a53573afe24fded2f2"], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000340)='./file0\x00', 0x1af) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000500)={0x0, {}, 0x0, {}, 0x8, 0xa, 0x16, 0x1, "de50d0635b08954e397e5429b2ddff9d74ae4a75432754d857ff790ac264b97d8098fdce73430b881945eea259ab8960724cfa14e96ff6f3a0137e3441183fd1", "351f707e32ff01adaf584d0b46c7c187c20b429582aae0727e11b64747d5f0ab", [0x8, 0xfffffffffffff001]}) 10:25:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x1}, 0x10044001) (fail_nth: 1) 10:25:55 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 96) 10:25:55 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x58281, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r4 = fcntl$dupfd(r2, 0x0, r0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) ioctl$SNAPSHOT_S2RAM(r4, 0x330b) r5 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat(r5, &(0x7f0000000040)='./file0/../file0\x00', 0x4080, 0x80) [ 3035.317984] FAULT_INJECTION: forcing a failure. [ 3035.317984] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3035.320738] CPU: 1 PID: 74484 Comm: syz-executor.0 Not tainted 5.10.199 #1 [ 3035.322382] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3035.324343] Call Trace: [ 3035.324975] dump_stack+0x107/0x167 [ 3035.325845] should_fail.cold+0x5/0xa [ 3035.326794] _copy_from_user+0x2e/0x1b0 [ 3035.327753] __copy_msghdr_from_user+0x91/0x4b0 [ 3035.328864] ? __ia32_sys_shutdown+0x80/0x80 [ 3035.329914] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3035.331173] ? __lock_acquire+0x1657/0x5b00 [ 3035.332203] ? __lock_acquire+0xbb1/0x5b00 [ 3035.333220] sendmsg_copy_msghdr+0xa1/0x160 [ 3035.334248] ? do_recvmmsg+0x6d0/0x6d0 [ 3035.335195] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3035.336439] ? lock_downgrade+0x6d0/0x6d0 [ 3035.337434] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3035.338704] ___sys_sendmsg+0xc6/0x170 [ 3035.339631] ? sendmsg_copy_msghdr+0x160/0x160 [ 3035.340731] ? __fget_files+0x26d/0x4c0 [ 3035.341680] ? lock_downgrade+0x6d0/0x6d0 [ 3035.342444] FAULT_INJECTION: forcing a failure. [ 3035.342444] name failslab, interval 1, probability 0, space 0, times 0 [ 3035.342674] ? find_held_lock+0x2c/0x110 [ 3035.342705] ? __fget_files+0x296/0x4c0 [ 3035.346792] ? __fget_light+0xea/0x290 [ 3035.347725] __sys_sendmsg+0xe5/0x1b0 [ 3035.348625] ? __sys_sendmsg_sock+0x40/0x40 [ 3035.349644] ? rcu_read_lock_any_held+0x75/0xa0 [ 3035.350778] ? fput_many+0x2f/0x1a0 [ 3035.351640] ? ksys_write+0x1a9/0x260 [ 3035.352548] ? __ia32_sys_read+0xb0/0xb0 [ 3035.353515] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3035.354767] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3035.355988] ? trace_hardirqs_on+0x5b/0x180 [ 3035.357012] do_syscall_64+0x33/0x40 [ 3035.357896] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3035.359125] RIP: 0033:0x7ff2734ecb19 [ 3035.360004] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3035.364327] RSP: 002b:00007ff270a62188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3035.366110] RAX: ffffffffffffffda RBX: 00007ff2735fff60 RCX: 00007ff2734ecb19 [ 3035.367770] RDX: 0000000010044001 RSI: 00000000200006c0 RDI: 0000000000000003 [ 3035.369429] RBP: 00007ff270a621d0 R08: 0000000000000000 R09: 0000000000000000 [ 3035.371103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3035.372765] R13: 00007ffd83d2a33f R14: 00007ff270a62300 R15: 0000000000022000 [ 3035.374483] CPU: 0 PID: 74489 Comm: syz-executor.7 Not tainted 5.10.199 #1 10:25:55 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0/../file0\x00', 0x1, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3035.375871] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3035.377669] Call Trace: [ 3035.378241] dump_stack+0x107/0x167 [ 3035.378961] should_fail.cold+0x5/0xa [ 3035.379711] ? create_object.isra.0+0x3a/0xa20 [ 3035.380609] should_failslab+0x5/0x20 [ 3035.381354] kmem_cache_alloc+0x5b/0x310 [ 3035.382164] ? mark_held_locks+0x9e/0xe0 [ 3035.382962] create_object.isra.0+0x3a/0xa20 [ 3035.383823] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3035.384822] kmem_cache_alloc_trace+0x151/0x320 [ 3035.385751] __memcg_init_list_lru_node+0x7f/0x1e0 [ 3035.386728] __list_lru_init+0x44d/0x890 [ 3035.387538] alloc_super+0x8b8/0xa90 [ 3035.388277] ? fput+0x20/0x20 [ 3035.388893] sget_fc+0x13e/0x750 [ 3035.389560] ? set_anon_super+0xc0/0xc0 [ 3035.390363] ? rpc_kill_sb+0x1b0/0x1b0 [ 3035.391130] get_tree_keyed+0x55/0x210 [ 3035.391896] vfs_get_tree+0x8e/0x300 [ 3035.392635] path_mount+0x13be/0x20b0 [ 3035.393409] ? strncpy_from_user+0x9e/0x470 [ 3035.394278] ? finish_automount+0xa90/0xa90 [ 3035.395127] ? getname_flags.part.0+0x1dd/0x4f0 [ 3035.396055] __x64_sys_mount+0x282/0x300 [ 3035.396861] ? copy_mnt_ns+0xa00/0xa00 [ 3035.397631] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3035.398670] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3035.399682] do_syscall_64+0x33/0x40 [ 3035.400413] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3035.401411] RIP: 0033:0x7f508b208b19 [ 3035.402153] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3035.405730] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3035.407218] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 3035.408602] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 3035.409991] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3035.411382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3035.412769] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:26:13 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 97) 10:26:13 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x80, 0xa, &(0x7f0000001b40)=[{&(0x7f0000000100)="46284a98aacd0a65494fdac29412a6a3df92b1a1a985b273e632288264bdf876498506bc29e064cae7152cc82f4a912642fc4ee84a20beb069695de04fd0f1a493343fa4556f6d49aac0626436d296f9e98c5232ccd7ed7c12580c2dc29c8652d48f8e5113e1f7cf862b531471d00cf1f6eb99c3d520da2df91f", 0x7a, 0xf64}, {&(0x7f0000000500)="866e35a08b498ef678b764723c042e3fabc29c62a35841f3adedf8b75a7d116a97121da549ba734de5050600610cdbc252a347eda68a95d9165963085b996b70d76ef9cf1660cb5b9e50f1414cd07d87aac888f551861a9e6bfdc99684594a14d380490e3bc7bcce281c62138d2570e1796b29a36fe92423b0deb9e00f598449ebe751b4cf8f3276dba4e383d3fbfb543813a07188bce2abf07668be3379d110ddc9c9cdad95499726b883ef4472901172b4d5352beeb03eb3d46b00ce2cf53dc76010c1421eee8cb4872f22d8d949c9d2e1946f86cfe085a76b4cc6a8ee53fd66955ae3227f8cac2a96feb2e199", 0xee, 0x651484bc}, {&(0x7f0000000600)="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", 0xfb, 0x8001}, {&(0x7f00000002c0)}, {&(0x7f0000000b40)="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", 0x1000, 0x4}, {&(0x7f0000000700)="7fede0e627c2abade7660fc92c8901f82a6d4d9dd9b3ae1188810e685693acdbe0466346ba4672c4b5a4bf720e1630e3a451399af6218687509916c2ba349a3054ccd60c081dd280ae6cc01540f489ee55fb1742aa5d5348cd60416c43217bfd9cf7fe3a6feb604c453ea94ad7c12f8905000c1aeafeb09b669b77a86948f915a0ce96afabd497d218aa435a4640a503040cf6d13fcaacbdabbdf656f8b5d67b9f6d7e5cfba76e4973273eeaceef46c5e6d169", 0xb3, 0xa01a}, {&(0x7f0000000300)="a14e02d7ac48129dc6324eb043bd9b47372d29a1f42c68b0721caf40c2b8c5d7bedeb117fd2fe715f81149b16a766ff420aa79fca6e1c1f3b2dcb33bc909655e583dd1bba716ae363dcd2a63462c82d76ccaae0ffd51b2e9d1cf", 0x5a, 0x6e}, {&(0x7f00000007c0)="eecf8a14a9be2624cb12ba11668804bd1bd1ac9d295427f08dce8c393c90c6cb68464de5a38136e83f73a72faeb64dc2cc74572a3e701cc52d7b1c39bc33868941e89aae69b8a9da8bcc4854f08ec7c5d6e3f928defe3c55e02791684303f9076c529dc4a9f9afda03cb947143b91ab42d7a7a8bcbbd9e3615cdac20a63c105e44cc480ed282d43d8c9d6206d7404a23002c66467b930098a853ed43702af0692b07a96d04f87ba1d12525c33485e0e9e5c642fbc0d6052c2a4dacc1c44141080413bff5d261fbed16aa357a6562039032eee7ebfa516a4bfe6c6a6c6a26522adfe1d2748516b4cdaf55260e", 0xec, 0x7}, {&(0x7f00000008c0)="045f8432a4311670b9ebeaefd9d4327dcbfe78db98041d4180310feb0acdfba50626d5d1c0af3b1cff441c7a858e2508d34accc52ec650b1b28b394222ec29e94d9f13e895d867e267b162363ba2b39b19d6eb5783d4f6a8a63bb45df3d6dfc14e5c7a402be8f322db01cb6e0d281c9d409ba3b3e1145336a89927a84b410648be4b314a48f0c585c80b730ee78a3a83975e4b6b0bf72a0da1a995910c768776a6621a", 0xa3, 0xffffffff}, {&(0x7f0000000980)="42213a9b51a7c8d93e41f22aaf73f92ff17546f1a81da05e1719798e6ebc4a25af809471179293efb0708594ed67c7454dffd6538aa2900cb9e46da2ea51e102710e8eea8e5a44c5918ae93b59b3300d2394a2d4917f5e9e7e5263ab81b051f8313ff03e40cb91d3e3e7eeb2b7f1181391ce019b2d3e1a281c5bbce3193e0fc10307fde3bbff371e822a26aa111fee96772c6fe6fc86278001f7d0b50f0ac80bfeca03d7208b6c3d4bdb04e9b9d37c114539f36585eba5fdad676c18785f40a04cc361f46b0d839f0c3da3058964058989dfd4b9c694c29441b0a18c72", 0xdd, 0x470}], 0x4000, &(0x7f0000001c40)={[{@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x35, 0x4f71639874f80b79, 0x31]}}, {@huge_never}, {@uid={'uid', 0x3d, 0xee00}}, {@size={'size', 0x3d, [0x70, 0x70, 0x65, 0x67, 0x39, 0x67]}}, {@huge_within_size}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}], [{@uid_eq}, {@hash}, {@obj_role={'obj_role', 0x3d, 'rpc_pipefs\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, '-%@#).]][:/&\x83'}}]}) ioctl(r1, 0x800, &(0x7f0000001e00)="7827e006903bddf782ecff16d1befe3094af77f8322118a58df66e8f39083fc69037497b429ff3f1eee9dd0c69831def9592153872197558fee46c133bf42f571edeb804645cb32a6d0736a5bd106e624cbed4a3c356e678b6bf63fdc63e02cba9ec4a884b4a6e4868671a40de444e485aa34aa6de8b18afe7a804935af05b91615317ac7a82df3a7bdc8bff2816f2f09e00a797b595d88ef7fc3cad5ffde58f2fba9f") r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:26:13 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:26:13 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_OPENAT={0x12, 0x4, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f00000001c0)='./file0/../file0\x00', 0x12, 0x9a001, 0x23456}, 0xb77e) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:26:13 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x100000000000000, 0x0) 10:26:13 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) getdents64(r0, &(0x7f0000000240)=""/139, 0x8b) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) openat(r2, &(0x7f0000000080)='./file0\x00', 0x2000, 0x80) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:26:13 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) copy_file_range(r1, &(0x7f0000000100)=0x1, r0, &(0x7f0000000140)=0xa5d, 0xfffffffffffff56e, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYRES64=r3], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r5, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x334270580, 0x0, 0x0, 0x0, {}, 0x0, 0x4f, 0x0, 0x0}, 0x58) 10:26:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x1}, 0x10044001) (fail_nth: 2) [ 3053.366327] FAULT_INJECTION: forcing a failure. [ 3053.366327] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3053.368853] CPU: 1 PID: 74904 Comm: syz-executor.0 Not tainted 5.10.199 #1 [ 3053.370339] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3053.370811] FAULT_INJECTION: forcing a failure. [ 3053.370811] name failslab, interval 1, probability 0, space 0, times 0 [ 3053.372045] Call Trace: [ 3053.372069] dump_stack+0x107/0x167 [ 3053.372094] should_fail.cold+0x5/0xa [ 3053.372120] _copy_from_user+0x2e/0x1b0 [ 3053.376784] iovec_from_user+0x141/0x400 [ 3053.377643] __import_iovec+0x67/0x590 [ 3053.378479] ? __ia32_sys_shutdown+0x80/0x80 [ 3053.379412] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3053.380506] import_iovec+0x83/0xb0 [ 3053.381288] sendmsg_copy_msghdr+0x131/0x160 [ 3053.382195] ? do_recvmmsg+0x6d0/0x6d0 [ 3053.383014] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3053.384100] ? lock_downgrade+0x6d0/0x6d0 [ 3053.384963] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3053.386047] ___sys_sendmsg+0xc6/0x170 [ 3053.386860] ? sendmsg_copy_msghdr+0x160/0x160 [ 3053.387806] ? __fget_files+0x26d/0x4c0 [ 3053.388641] ? lock_downgrade+0x6d0/0x6d0 [ 3053.389501] ? find_held_lock+0x2c/0x110 [ 3053.390382] ? __fget_files+0x296/0x4c0 [ 3053.391230] ? __fget_light+0xea/0x290 [ 3053.392054] __sys_sendmsg+0xe5/0x1b0 [ 3053.392844] ? __sys_sendmsg_sock+0x40/0x40 [ 3053.393734] ? rcu_read_lock_any_held+0x75/0xa0 [ 3053.394718] ? fput_many+0x2f/0x1a0 [ 3053.395474] ? ksys_write+0x1a9/0x260 [ 3053.396273] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3053.397349] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3053.398412] ? trace_hardirqs_on+0x5b/0x180 [ 3053.399307] do_syscall_64+0x33/0x40 [ 3053.400082] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3053.401135] RIP: 0033:0x7ff2734ecb19 [ 3053.401907] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3053.405695] RSP: 002b:00007ff270a62188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3053.407273] RAX: ffffffffffffffda RBX: 00007ff2735fff60 RCX: 00007ff2734ecb19 [ 3053.408742] RDX: 0000000010044001 RSI: 00000000200006c0 RDI: 0000000000000003 [ 3053.410206] RBP: 00007ff270a621d0 R08: 0000000000000000 R09: 0000000000000000 [ 3053.411677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3053.413141] R13: 00007ffd83d2a33f R14: 00007ff270a62300 R15: 0000000000022000 [ 3053.414802] CPU: 0 PID: 74897 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 3053.415989] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3053.417383] Call Trace: [ 3053.417829] dump_stack+0x107/0x167 [ 3053.418451] should_fail.cold+0x5/0xa [ 3053.419094] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 3053.419943] should_failslab+0x5/0x20 [ 3053.420578] kmem_cache_alloc_trace+0x55/0x320 [ 3053.421344] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3053.422192] __memcg_init_list_lru_node+0x7f/0x1e0 [ 3053.423036] __list_lru_init+0x44d/0x890 [ 3053.423713] alloc_super+0x8b8/0xa90 [ 3053.424310] ? fput+0x20/0x20 [ 3053.424833] sget_fc+0x13e/0x750 [ 3053.425399] ? set_anon_super+0xc0/0xc0 [ 3053.426066] ? rpc_kill_sb+0x1b0/0x1b0 [ 3053.426733] get_tree_keyed+0x55/0x210 [ 3053.427379] vfs_get_tree+0x8e/0x300 [ 3053.428001] path_mount+0x13be/0x20b0 [ 3053.428650] ? strncpy_from_user+0x9e/0x470 [ 3053.429371] ? finish_automount+0xa90/0xa90 [ 3053.430090] ? getname_flags.part.0+0x1dd/0x4f0 [ 3053.430898] __x64_sys_mount+0x282/0x300 [ 3053.431594] ? copy_mnt_ns+0xa00/0xa00 [ 3053.432247] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3053.433118] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3053.433985] do_syscall_64+0x33/0x40 [ 3053.434618] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3053.435468] RIP: 0033:0x7f508b208b19 [ 3053.436086] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3053.439150] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3053.440417] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 3053.441603] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 3053.442786] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3053.443963] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3053.445147] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 [ 3053.478276] tmpfs: Bad value for 'nr_blocks' 10:26:13 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x200000000000000, 0x0) 10:26:13 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 98) 10:26:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x1}, 0x10044001) (fail_nth: 3) 10:26:13 executing program 1: mount(0x0, &(0x7f00000002c0)='./file0/../file0/file0\x00', 0x0, 0x2349400, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000500)) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @private=0xa010101}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r4 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r4, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r4, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') socket$netlink(0x10, 0x3, 0x10) clone3(&(0x7f0000000ac0)={0x8000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x58) 10:26:13 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xaa00, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) sendto$inet(r1, &(0x7f0000000500)="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", 0x1000, 0x850, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f0000000080)={'nat\x00', 0x0, 0x3, 0xe9, [0x7, 0x3, 0x3, 0x9, 0x1, 0x1], 0x1, &(0x7f0000000000)=[{}], &(0x7f0000000340)=""/233}, &(0x7f00000001c0)=0x78) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) [ 3053.655003] FAULT_INJECTION: forcing a failure. [ 3053.655003] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3053.656749] CPU: 0 PID: 75311 Comm: syz-executor.0 Not tainted 5.10.199 #1 [ 3053.657764] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3053.658970] Call Trace: [ 3053.659362] dump_stack+0x107/0x167 [ 3053.659891] should_fail.cold+0x5/0xa [ 3053.660447] _copy_to_user+0x2e/0x180 [ 3053.661000] simple_read_from_buffer+0xcc/0x160 [ 3053.661667] proc_fail_nth_read+0x198/0x230 [ 3053.662296] ? proc_sessionid_read+0x230/0x230 [ 3053.662960] ? security_file_permission+0x24e/0x570 [ 3053.663671] ? perf_trace_initcall_start+0x101/0x380 [ 3053.664410] ? proc_sessionid_read+0x230/0x230 [ 3053.665062] vfs_read+0x228/0x580 [ 3053.665564] ksys_read+0x12d/0x260 [ 3053.666074] ? vfs_write+0xa70/0xa70 [ 3053.666620] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3053.667372] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3053.668112] do_syscall_64+0x33/0x40 [ 3053.668657] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3053.669415] RIP: 0033:0x7ff27349f69c [ 3053.669968] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 10:26:13 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0], 0xfffffffffffffffa) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000240)=0xffffffffffffffff, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x15) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) [ 3053.672702] RSP: 002b:00007ff270a62170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3053.673924] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007ff27349f69c [ 3053.675009] RDX: 000000000000000f RSI: 00007ff270a621e0 RDI: 0000000000000004 [ 3053.676094] RBP: 00007ff270a621d0 R08: 0000000000000000 R09: 0000000000000000 [ 3053.677169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3053.678206] R13: 00007ffd83d2a33f R14: 00007ff270a62300 R15: 0000000000022000 10:26:13 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x300000000000000, 0x0) 10:26:13 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000002c0), 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), r1) sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000500)={0x188, r4, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x20}]}, @TIPC_NLA_SOCK={0x8, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x38, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x647}]}]}, @TIPC_NLA_SOCK={0x68, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x37782d89}, @TIPC_NLA_CON_NODE={0x8}]}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}]}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xe45}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x100}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_SOCK={0xa0, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1e5}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7a1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x400}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}]}, @TIPC_NLA_SOCK_CON={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfffffff9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9d}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1ff}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x188}}, 0x40000) [ 3053.752018] FAULT_INJECTION: forcing a failure. [ 3053.752018] name failslab, interval 1, probability 0, space 0, times 0 [ 3053.754908] CPU: 1 PID: 75318 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 3053.756322] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3053.758027] Call Trace: [ 3053.758577] dump_stack+0x107/0x167 [ 3053.759330] should_fail.cold+0x5/0xa [ 3053.760109] ? create_object.isra.0+0x3a/0xa20 [ 3053.761058] should_failslab+0x5/0x20 [ 3053.761891] kmem_cache_alloc+0x5b/0x310 [ 3053.762750] ? mark_held_locks+0x9e/0xe0 [ 3053.763620] create_object.isra.0+0x3a/0xa20 [ 3053.764531] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3053.765632] kmem_cache_alloc_trace+0x151/0x320 [ 3053.766734] __memcg_init_list_lru_node+0x7f/0x1e0 [ 3053.767878] __list_lru_init+0x44d/0x890 [ 3053.768838] alloc_super+0x8b8/0xa90 [ 3053.769720] ? fput+0x20/0x20 [ 3053.770466] sget_fc+0x13e/0x750 [ 3053.771249] ? set_anon_super+0xc0/0xc0 [ 3053.772176] ? rpc_kill_sb+0x1b0/0x1b0 [ 3053.773077] get_tree_keyed+0x55/0x210 [ 3053.773979] vfs_get_tree+0x8e/0x300 [ 3053.774854] path_mount+0x13be/0x20b0 [ 3053.775741] ? strncpy_from_user+0x9e/0x470 [ 3053.776741] ? finish_automount+0xa90/0xa90 [ 3053.777738] ? getname_flags.part.0+0x1dd/0x4f0 [ 3053.778844] __x64_sys_mount+0x282/0x300 [ 3053.779777] ? copy_mnt_ns+0xa00/0xa00 [ 3053.780674] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3053.781871] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3053.783090] do_syscall_64+0x33/0x40 [ 3053.783950] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3053.785148] RIP: 0033:0x7f508b208b19 [ 3053.786002] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3053.790312] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3053.792051] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 3053.793670] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 3053.795308] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3053.796956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3053.798593] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:26:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x1}, 0x10044001) 10:26:30 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400000, 0x2d3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:26:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 99) 10:26:30 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/softnet_stat\x00') r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) preadv(r3, &(0x7f0000000840)=[{&(0x7f0000000340)=""/93, 0x5d}, {&(0x7f0000000500)=""/177, 0xb1}, {&(0x7f00000005c0)=""/76, 0x4c}, {&(0x7f0000000640)=""/213, 0xd5}, {&(0x7f0000000740)=""/99, 0x63}, {&(0x7f00000007c0)=""/86, 0x56}], 0x6, 0x8, 0x5) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x82000) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001e00)={0x0, 0x6}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r4) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000140)=ANY=[@ANYRES16, @ANYRES32=r0], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r5, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r6, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:26:30 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x1600000000000000, 0x0) 10:26:30 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x470480, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000002c0), 0x4) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:26:30 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/48, &(0x7f0000000140)=0x13) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x1, 0x100, 0xb91, 0xffffffffffffffff, 0x20000000000000}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) pread64(r2, &(0x7f0000000240)=""/145, 0x91, 0x4) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x7, 0x0, 0x0, 0x108021, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:26:30 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1454, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x4e21, 0x5f3c, @empty, 0x3}}, 0x0, 0x0, 0x27, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d20a194aef52ea581230c06dd3c1af00"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x9, 0x0, 0x0, 0x10, 0x0) write$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB="1f05feb046880f9081d486dd00722a5520415bf800f5a2b46f492e975e3709cb5c45515d6298d94a11e2f07113fc922e2d299724e9ad43648b3e559962723f41c44fead5a97b3246b76d5287bc0093ca3075fafc8ecfd75c1d5505505f5c0c0d8e570802ab8b77d760e9f005cbf69460fe2d92dc9122122faa6e4c5e388455a3e680142eaef6a62ed55f2bc356c29c"], 0xa) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="95390000000000000000050000000c00018008000100", @ANYRES32=r4, @ANYBLOB="0500060000000000"], 0x28}}, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001880)={&(0x7f0000003080)={0x12ac, 0x0, 0x8, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_FEATURES_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_FEATURES_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_FEATURES_WANTED={0x11ec, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x8e, 0x4, "d0f8122f7b29457412f7fce20698ad0d8f1b0afc1a9db0bf12f6f19df4720a400e9d3c3c09b5ccba32a51d02c484f26cfaf8c91152f6d68b30fb501ec604e707bc74113513bf3b8c5a90624c789b65d4f5821e7594c41419b1ca2c042b42f9c001c81fc34c9e641ae35e515a02c960e2d42c8cd7a8ed8f43b91fcc3408c9b9e85869a9417e045a88c354"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_MASK={0x1004, 0x5, "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"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x148, 0x3, 0x0, 0x1, [{0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '%\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x65, 0x2, '\x83\xef\\\xfb\xff\x98\xe6\x94$ 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3070.606005] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3070.607684] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 3070.609281] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 3070.610847] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3070.612394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3070.613934] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:26:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x1}, 0x10044001) 10:26:30 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2000000000000000, 0x0) 10:26:30 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x40, 0x0, 0x5e, 0x204, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f, 0x6, 0x0, 0x10000000}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:26:30 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3170001, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:26:30 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000002c0)=0xe, 0xc0800) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000300)={{0x1, 0x1, 0x18, r2, {0x4}}, './file0/../file0\x00'}) openat(r1, &(0x7f0000000040)='./file0/../file0\x00', 0x2100, 0x2) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r4, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:26:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0xa, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x1}, 0x10044001) 10:26:31 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2010000000000000, 0x0) 10:26:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x240, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x1}, 0x10044001) 10:26:31 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000100)=ANY=[@ANYBLOB="66696c5e65720800000094ed7134426be1f1a4a8fe312a7e8b32c9a341ae27b182fe48a8013f"], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e22, 0x3ff, @private2={0xfc, 0x2, '\x00', 0x1}, 0x3f}}, 0x0, 0x0, 0x6, 0x0, "3fe862014370bb83e1f9cbd2a9109d053f824969acf5a5a4ad366eb2e1f6d63ffaca30badb6786db52b8c39f4a83c0302d561fa18770a4f625f0351b056434ff9e16ef09744dd1ead37bf33da81598ba"}, 0xd8) 10:26:31 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x7}}, './file0/../file0\x00'}) 10:26:31 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 100) [ 3071.070326] FAULT_INJECTION: forcing a failure. [ 3071.070326] name failslab, interval 1, probability 0, space 0, times 0 [ 3071.072361] CPU: 1 PID: 76260 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 3071.073292] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3071.074452] Call Trace: [ 3071.074830] dump_stack+0x107/0x167 [ 3071.075351] should_fail.cold+0x5/0xa [ 3071.075895] ? create_object.isra.0+0x3a/0xa20 [ 3071.076548] should_failslab+0x5/0x20 [ 3071.077084] kmem_cache_alloc+0x5b/0x310 [ 3071.077634] ? mark_held_locks+0x9e/0xe0 [ 3071.078204] create_object.isra.0+0x3a/0xa20 [ 3071.078763] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3071.079457] kmem_cache_alloc_trace+0x151/0x320 [ 3071.080113] __memcg_init_list_lru_node+0x7f/0x1e0 [ 3071.080824] __list_lru_init+0x44d/0x890 [ 3071.081395] alloc_super+0x8b8/0xa90 [ 3071.081924] ? fput+0x20/0x20 [ 3071.082349] sget_fc+0x13e/0x750 [ 3071.082830] ? set_anon_super+0xc0/0xc0 [ 3071.083383] ? rpc_kill_sb+0x1b0/0x1b0 [ 3071.083933] get_tree_keyed+0x55/0x210 [ 3071.084429] vfs_get_tree+0x8e/0x300 [ 3071.084932] path_mount+0x13be/0x20b0 [ 3071.085447] ? strncpy_from_user+0x9e/0x470 [ 3071.086020] ? finish_automount+0xa90/0xa90 [ 3071.086601] ? getname_flags.part.0+0x1dd/0x4f0 [ 3071.087230] __x64_sys_mount+0x282/0x300 [ 3071.087802] ? copy_mnt_ns+0xa00/0xa00 [ 3071.088353] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3071.089085] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3071.089812] do_syscall_64+0x33/0x40 [ 3071.090334] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3071.091070] RIP: 0033:0x7f508b208b19 [ 3071.091595] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3071.093851] RSP: 002b:00007f508877e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 3071.094885] RAX: ffffffffffffffda RBX: 00007f508b31bf60 RCX: 00007f508b208b19 [ 3071.095883] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 3071.096851] RBP: 00007f508877e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3071.097820] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 3071.098774] R13: 00007ffcfe112f9f R14: 00007f508877e300 R15: 0000000000022000 10:26:44 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2e00000000000000, 0x0) 10:26:44 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) pwritev(r1, &(0x7f0000000440)=[{&(0x7f0000000340)="7f15c039c45bc238489e62cf524675f79f28409fb1cf294b66b969712ac3095f69d0abd7ad7590c7db4c811b9546d6d76ad36639b65c8fa401234a9824278ee3c82b0e69b6c6d4629fdfd85452476ed995f88f8a60db210d5f9a18a1c39043c9f5f95ac396514bd2a54707084ce5860c8b01935dd007d780a0a4342c0ae6d12ab9fa68383aca9d96f4dbc71f1afecd20f3084f6d5e85b2a69974495b2ef4f5aa68d00990068038bb94a2b7798eae7ba2e6a922fac56514076af640fd34e9cecb8855f1e72e05e715f600876a1ff1a0583e1085d682ddb8480b", 0xd9}, {&(0x7f00000001c0)="c22287f85dfaca766916aa2555ad701418f39a4a2d94e36a0a16253da297d6ea23a81e3537b6b0a8db4d78a5752d1aff", 0x30}, {&(0x7f0000000500)="5a55503fa8fc5a1f9c3babe2f292df57ab3bc0a54d346e3482e40dcfc86245eab979917baad6d3cecbd2d29728c38c29fa3c7d981b70ccd7f1cecec5ecd9f8674360b8f0ac9754bf4f13cf77838ecfbc551f10fd537802761c98166fcb50d525853e6985ed22abe0443c22866c01ae20fc94f57767b1cc221dc183bbf493f2491d56f3aed5351481fbc94039e7a1dd4d1bca8438f4c77347e04bee516517f5ff45ae651595be032b3d1364c3edf2d107a293dbeaf374879c8f158116006b6a7348a5cecd066ffebcec463390dac25be24ad0", 0xd2}, {&(0x7f0000000240)="7d7e00f2fa126b6e454ec571008938ef44a9d95d6e0dfb3705088ff7bc77e63dd7f0c66ee7a6a27091275be797c73525b6e12fa59c5eb0a89362d55f78a3d7e102548b4d14e3691a0bdc", 0x4a}, {&(0x7f0000000600)="acf0e40b8727fddf5c5f562e67fa71bf492b6029d468001c4bdf1755ef2d8fafea5baedb5e283f0339b94e8b50d2e75820f1b507598c08ee759fc9c904c75c7d5fafaf23a24dddd60187998e5a348f55ea403363b372bc91bd3d1bb3d8858ad0fb2e2dc3407124410b1cdf1b21d51149655d659c097720daa1958b2e0fb6e314590f99cfe980a77a649015f55abef53f0929abe709d6d0851b6d10d378de93a42638bbfb4b073d334aad20e63d952d430d0707d10d95b0c80e52aad88f7bd5521f18c1cf30249967446d9a63", 0xcc}, {&(0x7f00000002c0)="410a193f6f7c656eff268689e580aa76a0df72aba2ebf8316528a4d75a60f3e33c89ae632b9ef626a523c8cf99", 0x2d}, {&(0x7f0000000700)="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", 0x1000}], 0x7, 0xfffffffa, 0x5) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000080)={0x4, 0x6, 0x7}) 10:26:44 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xc8, 0x20, 0x200, 0x70bd27, 0x25dfdbfe, {0xf}, [@nested={0xaf, 0x91, 0x0, 0x1, [@typed={0x8, 0x4d, 0x0, 0x0, @ipv4=@loopback}, @generic="8855ffd55d8690fdf70396d0f10839aef95459690b6a7f4e5f383d5d99b195dde2a78884296995c2f4be73d645db97754608b08e63426c3293c72edc96929772b591ff834e5c93f238d2ae25a9f6f15c168f317aeaf05a68ee22ea10c7ce201daacb5ecd00387c4ed4c7b2e59b60afb49a5062981b0a132fb11d6c1ab7efd53847c94d90570b1b6196baf01d010a7d220959e39e70a0c6ffad326283cc2e0fe3eeff9a"]}, @nested={0x4, 0x38}]}, 0xc8}, 0x1, 0x0, 0x0, 0x2000c040}, 0x4800) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:26:44 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040), 0x4) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:26:44 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:26:44 executing program 2: mount(0x0, &(0x7f0000000040)='./file0/../file0\x00', 0x0, 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @private=0xa010102}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:26:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0xa00, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x1}, 0x10044001) 10:26:44 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socketpair(0x2c, 0x6, 0x9, &(0x7f00000001c0)={0xffffffffffffffff}) writev(r1, &(0x7f0000000740)=[{&(0x7f0000000240)="ec0601befc1fe84cda8cf939b2f7d2371231caf8ae12ed488256ec7d", 0x1c}, {&(0x7f0000000280)}, {&(0x7f00000002c0)="a3e8265bcb24141b3b3fd577a6c51c97a4a16bfc9dee27fd3573dbc05713f18fbbf731fa99a314", 0x27}, {&(0x7f0000000340)="70ea59f6bfd88b6a98851186ec106ecb1ca5474b68b4c60acac55a446970c20360ec", 0x22}, {&(0x7f0000000600)="4a4ec20e449e122387b8e0e10f431a0396d22a0ffdc6a6f176a945643404b9c35437e36a432e6fc62c7d1ba63fc91ac1d432a62b902b1d75a053c2404ff7aed2314eed0648203a7589abce83593d120df502ea6f65ba77e1f2d4d43db16fa0978b94a0075a44037d78254ee56351b4f49f8b63ba132dd22d8658dc4d09eb0b5156112b83255680708c593442e8368a93eceb", 0x92}, {&(0x7f00000006c0)="948aa7750f65e44cec76e91a5f31f073cc02b562a27165db85b94ad94e4f9ec20145e068ea11b9b5c414f0ddbe3e05cfaf3793b3e2736f077b71710ea5dfc3a59f3681f4b8639fd7147449362b382b720006964f92556c986b08ec31a95199ad26f548143da8cf3d42794b9c6bd8", 0x6e}], 0x6) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:26:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x4002, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x1}, 0x10044001) 10:26:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x10020, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x1}, 0x10044001) 10:26:44 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="5e0e0000000000000000"], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xd}}, 0xf4) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f00000002c0), &(0x7f0000000500)=ANY=[@ANYBLOB="02e7121178444d78bca23f1df86c0d88ec4b804f3698331b03ab3133b58dc4bd"], 0x10, 0x2) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x5, 0x7) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:26:44 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, '\x00', [{0x14, 0x80, 0x3, 0x11417f92, 0x1000, 0x6}, {0x6, 0x7f, 0xe0bb, 0x0, 0x3, 0xfffffffffffffffd}], ['\x00', '\x00']}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r4 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$AUDIT_USER(r4, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)={0x4c, 0x3ed, 0x0, 0x70bd27, 0x25dfdbfd, "50d6ac152176f82c8bdb94dc906753a1c3fde0b8562fa4c8a099b9399d919453c6e20ea980407f819a925b1c50f473d7c0ec3087ea85db1ef999a2", [""]}, 0x4c}}, 0x20044000) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) ioctl$HIDIOCGDEVINFO(r4, 0x801c4803, &(0x7f00000002c0)=""/128) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:26:44 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2f00000000000000, 0x0) 10:26:44 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2, 0x0) 10:26:57 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x3f00000000000000, 0x0) 10:26:57 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x5) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:26:57 executing program 2: sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x5c, 0x1, 0x6, 0x807, 0x0, 0x0, {0xc, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20020000}, 0x800) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = open(&(0x7f0000000040)='./file0/../file0\x00', 0x4060c0, 0x20) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x1c, 0x2a, 0x400, 0x70bd2a, 0x25dfdbfd, {0xa}, [@typed={0x8, 0x4c, 0x0, 0x0, @ipv4=@loopback}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x8000) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='exfat\x00', 0x20e880e, 0x0) lsetxattr$security_capability(&(0x7f0000000500)='./file0/../file0\x00', &(0x7f0000000540), &(0x7f0000000580)=@v3={0x3000000, [{0x3, 0x6}, {0x0, 0x3}], 0xee01}, 0x18, 0x3) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:26:57 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x19) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x90000, 0x0) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:26:57 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x3, 0x0) 10:26:57 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r0 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) rename(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000001c0)='./file0/../file0\x00') r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x4e20, 0x6, @mcast1, 0x7}}, 0x0, 0x0, 0x29, 0x0, "2b16b6d05e60074d4f22ceb509b54c44108c047c14e160867bafbb8b879392c18498730dd9756fdf4ab7089540f342541bc68b7a69b77fe484bfd6088bc24a977158ea3ef62039a7ceb09cf2743cafc3"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000100), 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000240)=0x1, 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:26:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0xf0ff7f, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x1}, 0x10044001) 10:26:57 executing program 6: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:26:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0xa000000, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x1}, 0x10044001) 10:26:57 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x4000000000000000, 0x0) 10:26:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x20000100, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x1}, 0x10044001) 10:26:57 executing program 2: mount(0x0, &(0x7f0000000040)='./file0/../file0\x00', 0x0, 0x80400, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) mount(&(0x7f0000000080)=@sr0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='efivarfs\x00', 0x1110008, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:26:57 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000001c0), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) syz_open_procfs(0x0, &(0x7f0000000240)='autogroup\x00') 10:27:12 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x5, 0x0, 0xdb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:27:12 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x7a8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="cdab6c74257205005c00"], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) creat(&(0x7f0000000100)='./file0/../file0\x00', 0x10b) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:27:12 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x4002000000000000, 0x0) 10:27:12 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0xff, 0x9, 0x80, 0xb1, 0x0, 0x401, 0x8220, 0xa, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x7fff, 0x401}, 0x8800, 0x5, 0x2b3, 0x0, 0x100, 0x8, 0x4, 0x0, 0x6, 0x0, 0x1328875b}, 0x0, 0xe, r1, 0x1) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000004c0)=""/64, &(0x7f0000000140)=0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) r3 = accept$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @initdev}, &(0x7f0000000240)=0x10) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000280), 0x4) 10:27:12 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x4, 0x0) 10:27:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x40020000, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x1}, 0x10044001) 10:27:12 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:27:12 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r3, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) accept4(r4, &(0x7f0000000040)=@pppoe={0x18, 0x0, {0x0, @random}}, &(0x7f0000000100)=0x80, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:27:12 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x7503000000000000, 0x0) 10:27:12 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e22, 0x7fff, @mcast2, 0x400}, 0x1c) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:27:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x7ffff000, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x1}, 0x10044001) 10:27:12 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x8cffffff00000000, 0x0) 10:27:12 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x8, 0x0) 10:27:12 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = dup2(r2, r0) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) 10:27:12 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r3 = fcntl$dupfd(r1, 0x406, r0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)=0x2) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:27:12 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x8f00000000000000, 0x0) 10:27:27 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000600)={@in={{0x2, 0x4e20, @empty}}, 0x0, 0x0, 0x2d, 0x0, "bd4de348c8b949bc1ede0046d6e55e675318f76517e60e842aa1f0a716629b3b72568cfe1e830ba72ab0dff07e5ee86da4c722fa37d7a5f40ef6947dcb2c7563d266fe5e4b1c7383d8872f9a2ea4019c"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) memfd_create(&(0x7f00000001c0)='-\'\\\\%/\x00', 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:27:27 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x16, 0x0) 10:27:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0xffffff7f, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x1}, 0x10044001) 10:27:27 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x8002, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:27:27 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_WRITE={0x17, 0x3, 0x6000, @fd=r0, 0x2, &(0x7f0000000040)="7230bee9f311546f48fdc454e028a82dac18715d4eaae31897ce21d4e141fe99f66681814cb6802ad16bc9fa8eb3d19574a4169257", 0x35, 0x1b}, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x20000, 0x21) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:27:27 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x9a02000000000000, 0x0) 10:27:27 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x6, 0xe1, 0x7, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000080), 0xa}, 0x10, 0x3, 0x10001, 0x1, 0x9, 0x65370b05, 0x0, 0x0, 0x3, 0x0, 0x4}, 0x0, 0xe, r1, 0x8) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:27:27 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r4, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r4, 0x6, 0x1f, &(0x7f0000000100)=""/64, &(0x7f0000000140)=0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000500)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x2e, 0x0, "82dc6709f14237ba23c1ddaac58252c0c1d2fde0a1bafa79ce0009cbf04927b541c339d568be15da1898f9a4e5ccf072293df4a9974319e42ffceeb71d71cbf2c251ca597caf315ecf651665dbbd5e0c"}, 0xd8) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:27:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100), 0xa}], 0x1}, 0x10044001) 10:27:28 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xa502000000000000, 0x0) 10:27:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2e, 0x0) 10:27:28 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:27:28 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x400000c, 0x4010, r1, 0x0) 10:27:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100), 0x240}], 0x1}, 0x10044001) 10:27:28 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0/../file0\x00', 0x200000, 0x42) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'geneve1\x00', 0x2}, 0x18) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:27:28 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xb903000000000000, 0x0) 10:27:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2f, 0x0) 10:27:28 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_open_dev$tty1(0xc, 0x4, 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="66696c74657208060000"], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x8a201, 0x60) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) faccessat2(r3, &(0x7f0000000040)='./file0\x00', 0x8, 0x400) 10:27:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100), 0xa00}], 0x1}, 0x10044001) 10:27:43 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = getpgrp(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0xfe, 0x4, 0x0, 0x0, 0x5e, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x842a}, r0, 0x3, 0xffffffffffffffff, 0x8) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) fcntl$dupfd(r2, 0x406, r3) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x5dc4, 0x0, 0x0, 0x120010, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:27:43 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filtsr\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) r3 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r3, &(0x7f00000002c0)={&(0x7f0000000040)=@x25={0x9, @remote}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000100)=""/11, 0xb}, {&(0x7f0000000500)=""/229, 0xe5}, {&(0x7f0000000600)=""/165, 0xa5}, {&(0x7f00000006c0)=""/78, 0x4e}, {&(0x7f0000000740)=""/83, 0x53}, {&(0x7f00000007c0)=""/225, 0xe1}, {&(0x7f00000008c0)=""/253, 0xfd}], 0x7, &(0x7f0000000140)=""/36, 0x24}, 0x40000060) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:27:43 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/crypto\x00', 0x0, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r3, 0x5000943a, &(0x7f0000000b40)={{r0}, 0x0, 0x0, @unused=[0x4, 0x1, 0x8, 0x10001], @devid}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:27:43 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x8f, 0x0) 10:27:43 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0xfffffffffffffea5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000600), 0x8}, 0x0, 0x0, 0x7f}, 0x0, 0x6, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @rand_addr=0x64010100}, 0x10) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) sendto$inet(r1, &(0x7f0000000640)="871af6889cd5c5043ad3bd3e66bb72b05e10c6e4b145f89da0b6ee8ecc", 0x1d, 0x0, &(0x7f0000000680)={0x2, 0x4e23, @remote}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000380), &(0x7f00000004c0)=0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) r3 = creat(&(0x7f0000000280)='./file0/../file0\x00', 0x2f) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000340)=0xc) r4 = socket$inet(0x2, 0x2, 0x6) sendto$inet(r4, &(0x7f00000001c0)="bc1c68a579cb7f51", 0x8, 0x280498c4, &(0x7f0000000240)={0x2, 0x4e20, @multicast2}, 0x10) 10:27:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100), 0x4002}], 0x1}, 0x10044001) 10:27:43 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xe903000000000000, 0x0) 10:27:43 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e540)={0x3, [], 0x80, "8f132cd8ad309f"}) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:27:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100), 0x10020}], 0x1}, 0x10044001) 10:27:43 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xf0ffffff00000000, 0x0) 10:27:43 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xf0, 0x0) 10:27:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100), 0xf0ff7f}], 0x1}, 0x10044001) 10:27:43 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000001c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x7) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000280), 0x2, 0x440080) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340), r2) sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r4, 0x100, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x8080}, 0x4004001) rmdir(&(0x7f0000000080)='./file0/../file0\x00') setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x4) socketpair(0xb, 0x6, 0x2, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000500)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:27:43 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in={{0x2, 0x4e23, @broadcast}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:27:43 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$SG_SET_TIMEOUT(r3, 0x2201, &(0x7f0000000040)=0xff) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:27:43 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x300, 0x0) 10:27:43 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f0000000100), 0x170069f11696b298}, 0x0, 0x401, 0x7f, 0x9, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000b40)=ANY=[@ANYRES32=r0, @ANYRES16=r0, @ANYBLOB="81aa98544da396b865c814c6b00e18f1b3a308c25e129f1f85698fa6e1e33a0808c47d1c7ac5d8066239f61b890bbe1d8f5c771a3c54d464eec882f19d8e6c8654d59b1e6f22f6696b0162ac1d680643363ed2c9a5d143241b81578a305e31aff744ef061b5f637edfb831c124d0c2093171a5ecb0aae249f8980ab965f810768ac204ac", @ANYRESOCT=r1], 0x28) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) recvfrom(r1, &(0x7f0000000c00)=""/4096, 0x1000, 0x12163, &(0x7f0000000140)=@l2tp={0x2, 0x0, @local, 0x2}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000040)='\x00', 0x400200, 0x1ab) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4f23, @remote}}, 0x0, 0x0, 0x31, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef5202581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x7, 0x0, 0x0, 0x2, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:27:58 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xf6ffffff00000000, 0x0) 10:27:58 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[@timestamp, @mss={0x2, 0x8}, @sack_perm, @sack_perm, @window={0x3, 0x1, 0x2}, @timestamp], 0x6) 10:27:58 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="6669e3cc661609000000"], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:27:58 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x4e20, 0x2, @local, 0x7}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e24, @private=0xa010101}, 0x10) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000240)=0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:27:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100), 0xa000000}], 0x1}, 0x10044001) 10:27:58 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000980)={&(0x7f0000000580)={0x3c8, r0, 0x400, 0x70bd2d, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x1ff, 0x4c}}}}, [@NL80211_ATTR_PROBE_RESP={0x6f, 0x91, "b957559f6f577abd841bfc06cddb928958a526658f01724a443312b5ea761f108f52bc28d5a48b1565942137f017b5ccaa2fa2bb3a7507c92bf609c8b778f448e2b6815a88b52278ae6c3960b321d9a2d55ae43b26c2b1286f588518349f64454e68e2a2ce96d45969002d"}, @NL80211_ATTR_IE_ASSOC_RESP={0x53, 0x80, [@peer_mgmt={0x75, 0x6, {0x1, 0xff73, @void, @val=0x11, @void}}, @mic={0x8c, 0x18, {0xd9b, "87cb112de6ad", @long="b3206bce76af1aac2379020002023ca9"}}, @challenge={0x10, 0x1, 0x44}, @dsss={0x3, 0x1, 0x30}, @erp={0x2a, 0x1}, @ht={0x2d, 0x1a, {0x8, 0x3, 0x7, 0x0, {0x7, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x8, 0x8, 0x1}}, @ssid={0x0, 0x6, @default_ibss_ssid}]}, @NL80211_ATTR_FTM_RESPONDER={0x1e8, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0xa8, 0x2, "af2506295676d4d80a81c8405f0f40c55eac5178d8fdbfd72ddc82620d802ee2a48588ef51c7fdc5f0bc48c14c31531131ae5445066ef95b7913d5f5c24cc380c91de8423727f9b77b494bf44f2716b3a8331aa4b65022b06c6a875b147970da2569f4d4277509acd3936a8bfbbd1e46ce28b9210af90fa2bad00cef23b116f9b134c9fc511fc54ff89119249de4eb39c8bff28d55de363e5b7a3fe102acbdcd390dee6f"}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0x4f, 0x3, "0947f791c8dea9be3297c7f30e12d832126b5530177f9e13b50e9b1f88eacf0b53d71866f50504f8bbbd232810476bd7c61682f4f3b9c2c0355861310080a0951682722bb854d9cc409ab7"}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0xea, 0x3, "d47421a459758285b1177d56149d9b91cdac7c5e4b1ef18585b7ad2419f4c7d1139dc2a2bc651be05b39d73c02d06696af1bfa7429636276169f2f60248ea5f1bea0eb0f5b39030b9bc175b46f15d16974651ac68104e519ee0f13ba820f2070b084509a60f7dc45d08e2c703240bf26b031b9058640b98b2bc53e2bd556023625c671c5e771c53181d982ee578571516778d8d48fa71d6e29af72f868255276544a5f9613a820440ac2f5427b8cc35de1af98811637393abe0fe2db98b0e647757a43f04307acc29e2bef99256cb5eeb3aedd3a705bc4946eaff88dc5a1f2f2d93064c91622"}]}, @NL80211_ATTR_IE={0x8, 0x2a, [@ssid={0x0, 0x2, @random="a813"}]}, @NL80211_ATTR_FTM_RESPONDER={0xec, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_CIVICLOC={0x7d, 0x3, "83a09719be1ca61a2ba36123c4b791f6cbb808e64bf51367d90a0a1e40b80f5d96e19d7ea7d0b0f2cb431fc1d35c839bd8b82f4ad5fac200741ac9ae96cd3daaf05017ff6b1642e552dab01dcfb7dbbebc28fcec2f21241e733e96dbf41c9e00f534b731f268be76a60b0f6f65e3ebc403d861cfc0c416f80c"}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_LCI={0x63, 0x2, "9ca90bc8a9ddf2c2031c929fc482571982f696c60a38efd3de676b5b6614b33b589eac8f5fa650a82974b17046c57c60133f47c3c4fa5be4a5aee5141e715b2073a6802b0e6233188fae2b1a7242339889bf6bc0cecc973b9154f579a51165"}]}]}, 0x3c8}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r4 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r4, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r4, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:27:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x372, 0x0) 10:27:58 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r2 = signalfd(r0, &(0x7f0000000040)={[0x400]}, 0x8) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000500)={@in={{0x2, 0x4e24, @empty}}, 0x0, 0x0, 0x2f, 0x0, "d34d74a454276820a1fa0e65561c3de06707a3fe166f1e366935a9bf3b79b6e466dbc9341fa4336aa076dc46a1f5aca1afea78e3847aa5092aad9682bbb2bb5b3ba2eae5ed382fd4fecb6e71c643d4d3"}, 0xd8) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r4, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:27:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100), 0x20000100}], 0x1}, 0x10044001) 10:27:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x375, 0x0) 10:27:58 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xfeffffff00000000, 0x0) 10:27:58 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="dd4d1e0e7eba09f10000"], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) linkat(r4, &(0x7f0000000100)='./file0/../file0\x00', r4, &(0x7f00000002c0)='./file0/../file0\x00', 0x1400) 10:27:58 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e23, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x11) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:28:14 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000100), 0x382, 0x440000) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0xc0000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)={0x68, 0x0, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x6}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x7}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xbd2}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x68}, 0x1, 0x0, 0x0, 0x20020840}, 0x48040) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x20000, 0x19) r4 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r4, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r4, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:28:14 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_IOC_CATATONIC(r1, 0x9362, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:28:14 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x2028, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfff}, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$msdos(&(0x7f0000000080), &(0x7f00000001c0)='./file0\x00', 0x9, 0x7, &(0x7f0000000680)=[{&(0x7f0000000240)="2c2e78b285f0f1a5a4340005afcebed677c1d14e90a6c327b2df6e17a4e2c2f9698840f435386b6b7b7c3df45f4b17f572af9a4190e09f555e78442443147bd4af61d1bfed8b39c87ff369", 0x4b, 0x5b0}, {&(0x7f00000002c0)="f78be0db777354c20322a41f3126cc6fda32a4d4a60ebc02a16e654d", 0x1c, 0x1}, {&(0x7f0000000340)="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", 0xfb}, {&(0x7f0000000440)="d588b8fbda9364fa4dccff23c11941302b4f6d6cf56029042af6058617ad17f5c0bdeaba1aba9e78e911d905b5771b9e36476ed131267645508ef4c1a8a91a406f3294056c591cf9eb227c3e9bdd0cf972fed28a5ac1aabcfa1e089d53f5575d561d27662f014e6bb74c61a459eb878fb414eb3bcc76cf5fe8", 0x79, 0x40}, {&(0x7f0000000500)="32a69e7c26f78dfd8ff9d4889a67acea787a55b6d868335dcaea56e092afcefb4b9a7bc5c0469d3b4056b57dfdff1fc08866c78e4ed80563649289a3268187ab4709f40645f7fb8fb3da859a1fcf1924e9c8ff635248e249d6878bfae3aee538b4c453454c53d5fbc4d10947dd88d92926c62c25ded39316", 0x78, 0xff}, {&(0x7f0000000580)="48a0d7ead65bed62fdb8f455cfd9209fae6e892da68b2e6c54813a5d657440cb421c5731e8f2b530ce060b164c420992f7bc58571b94e19db9e02dea7061396913f1634d43b42ac098954eb7d64211a0f952417b3fc4fcc378cde7c029acbab86e844fd9e0313c791178147481851ea771265d993297f1755ca1aa8db6279a", 0x7f, 0x7}, {&(0x7f0000000600)="c14275879a83194ccf420cac3bdacb5806224cc300b73da4278828041535aa5c3fe4f052a69a521a2e0905f3b04b41b6de22a6f68fe8ff9b096b4f0c37fe7ed2b6c99b34e11c11380718b8cd6decfa8fa79ab6c48dbd856dd33a5b391f6e772a2e3d21782109", 0x66, 0xd6}], 0x2000000, &(0x7f0000000880)=ANY=[@ANYBLOB="636865636b3d72656c617865642c6e6f646f74732c636865636b3d6e6f726d616c2c73686f77657865632c643b77b2e2eaafd12fc8646f74732c646f74732c646f74732c6e6f646f74732c646f733178666c6f7070792c666c7573682c7365636c6162656c2c66736d616769633d3078303030303030303030303030303030302c6f6204000000000000000000005f757365723d7270635f706970656673002c00bff604415bc7de4d2fff45c583f42db170b8bcd389023a476738b170c88d5efb0d7a8db73cc90cc32084910e18eb791a26adcead5403d637c291be8f09343f6fd8c12cc4d6834371f62bd3bd49c3fd956c234d34b33b765a82ea1ea1daf34ce0d4ae65c835c5edd545be"]) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) rename(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000740)='./file0\x00') getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000800)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:28:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100), 0x40020000}], 0x1}, 0x10044001) 10:28:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x3b9, 0x0) 10:28:14 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="6669ff7465003b76ad6d"], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) accept(r2, 0x0, &(0x7f0000000040)) 10:28:14 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xff03000000000000, 0x0) 10:28:14 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000080)={0x3, 'veth0_to_bond\x00', {0xffff}, 0x9f8}) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0xfe, 0xb91}) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x1, 0x5, 0x5, 0x5, 0x0, 0x6, 0x2, 0x6, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x965, 0x1, @perf_bp={&(0x7f0000000040)}, 0x4060, 0xf58f, 0x7ff, 0x7, 0xffffffffffff7fff, 0x4, 0x80, 0x0, 0x8, 0x0, 0x8c}, 0xffffffffffffffff, 0x10, r3, 0xa) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:28:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x3e9, 0x0) 10:28:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x1020, 0x0) 10:28:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100), 0x7ffff000}], 0x1}, 0x10044001) 10:28:14 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="6d580616b3c91f8d733401000080c4d309004fcb"], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x73, 0x2, {{0x40, 0x1, 0x6}}}, 0x18) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000100)=0xffffffff, 0x4) syz_io_uring_setup(0x2eed, &(0x7f00000002c0)={0x0, 0x9502, 0x2, 0x0, 0x13f, 0x0, r3}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000380)) syz_io_uring_setup(0x3ac4, &(0x7f00000002c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f0000000340)="c9", 0x1, 0x8}, 0x0) syz_io_uring_submit(r4, r6, &(0x7f0000000500)=@IORING_OP_LINK_TIMEOUT={0xf, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000580)={0x77359400}, 0x1, 0x1}, 0x8) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:28:14 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xffff1f0000000000, 0x0) 10:28:14 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:28:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100), 0xffffff7f}], 0x1}, 0x10044001) 10:28:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x1600, 0x0) 10:28:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2000, 0x0) 10:28:37 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRES64=r0], 0xfdef) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) recvfrom$inet6(r4, &(0x7f00000002c0)=""/131, 0x83, 0x10102, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @local, 0x400}, 0x1c) 10:28:37 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) r2 = creat(&(0x7f00000001c0)='./file1\x00', 0x81) sendfile(r1, r2, &(0x7f0000000240)=0x1f, 0x80000001) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = socket$netlink(0x10, 0x3, 0xf) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)={0x14, r4, 0x1, 0x0, 0x0, {{0xa}}}, 0x14}}, 0x0) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)={0x1064, r4, 0x800, 0x70bd26, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_PMSR_ATTR_PEERS={0x680, 0x5, 0x0, 0x1, [{0x1d8, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x2c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x6}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x3b}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x14c8}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x48, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x81}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x12}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x6}]}]}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x120, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0xf8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1b}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x20}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}]}]}]}, {0x78, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0xc, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0xfa}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x38e}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x4}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_CENTER_FREQ2={0x8}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x3a}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}]}, {0x31c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x2e8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0xf8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x16}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x11}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1d}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xd6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1c}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x12c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1d}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x20}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8000}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9d}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x40}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x16}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1a}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xc9}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xb}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xa0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1a}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x6}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}, {0x110, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x14, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x1}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x54, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x11c}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x24}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2b9}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x6}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x1}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x26}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x8c8c}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x64, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x5c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x40}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x5}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x14, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x27a}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}]}]}]}, @NL80211_PMSR_ATTR_PEERS={0x2e4, 0x5, 0x0, 0x1, [{0x2bc, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x9c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x84, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x15}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x81}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x20}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x16}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x14, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x4}, @NL80211_PMSR_PEER_ATTR_CHAN={0x14, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_REQ={0x1e4, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0xaa763dd96ed9154c}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xe0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1ff}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xfe}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8a}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x11}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x13}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xbc, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xa3ec}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xa0}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x20}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x48, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xff}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0x14, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}]}, @NL80211_PMSR_ATTR_PEERS={0x500, 0x5, 0x0, 0x1, [{0x300, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_CHAN={0x3c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x39}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x31}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x18c}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x326}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x141}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x3c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1671}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xa}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x26c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x74, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x59}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3f}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xb4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xce}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1c}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xf4ec}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1d}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xc6c}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1a}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xff}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x94, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xc00}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1b}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x6c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xaf}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x16}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xee9f}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2d}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}]}]}, {0x1b8, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_REQ={0x1a8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x54, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xcd}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x6}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xb}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x98, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2d}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7fff}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x81}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xfff}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xad30}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x88, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7b}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x61}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x11}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0xc, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0xc, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}, {0x28, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}]}]}, @NL80211_PMSR_ATTR_PEERS={0x1ec, 0x5, 0x0, 0x1, [{0x1e8, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_REQ={0x1cc, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x54, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7fff}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7fff}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x138, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xf9}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xfd}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xff}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x40}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x15}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x2}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x18}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}]}]}]}, 0x1064}, 0x1, 0x0, 0x0, 0x40080c0}, 0x20040000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:28:37 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0xb20040, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:28:37 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap$perf(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xa, 0x4010, 0xffffffffffffffff, 0x3f) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc000, 0x8) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:28:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100), 0x1002000000000}], 0x1}, 0x10044001) 10:28:37 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xffffff7f00000000, 0x0) 10:28:37 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000100)=ANY=[@ANYBLOB="0000f89e67b927894966213a0080022420000001"], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:28:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100), 0xf0ff7f00000000}], 0x1}, 0x10044001) 10:28:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2010, 0x0) 10:28:37 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xfffffffffffff000, 0x0) 10:28:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100), 0xa00000000000000}], 0x1}, 0x10044001) 10:28:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2e00, 0x0) 10:28:37 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="696e7a2a0d1ffca3e336"], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:28:37 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000001c0)='./file0\x00', 0x400, 0x4, &(0x7f0000000600)=[{&(0x7f0000000340)="14eedd652d304040c27de1acf91190a7a9e5ef9c44202c0740a1aefea97b04ba5dc7f87918a2bfee738c2b445d4204ff9646b90605c99dd5dc4c3ed267941a84e06a64e12ad758be2dabfd67a85d869b78686536f31839d6771d04ecda26f0e108f9c2b14d12a6eaf8a6e3f4e53732c38f036b4275554c592c890f17b4bb97a174b4f4037324261f34463706ad02a6b0c4fda8193642378e624ca5cc7759f10fbfbd801b6b646ff69c9992f80f52a547bce4e1b8e56b3a9c5eeb068f272d3a186b8e641034c7384ab2585f38738a9f58afebb5f72c421806cdda3b587ed066207ecbff", 0xe3, 0x3}, {&(0x7f0000000240)="ce72583697bc645b236493c2623a10a3a0283e1a4c11155df62a63a5e0c195ad273aa5dc2c14ad416a8aabc350ecd54077e5da3855eb1323d75be5d2730f1a53d425e844641798f989adb0bac1dad1f579922774ffab3c5165d349b052d346907ffdc96cd5764bbeb893e0709ddbb35b5c6e1f6531109db2afcd6ea4880163d519116768de2daa15bde236de21bed671", 0x90, 0xba}, {&(0x7f0000000440)="2ed334e5568e6bf9e7d9e0806d24b725eb2e47e270e332dca42afb375aeb3a572b0455e31282ae2d797bdc2227d5ad93c5d99533691fd81144db", 0x3a, 0x7b}, {&(0x7f0000000500)="153e8dce2d9bc82e6f561cf9a5e78cc64557e7c7dea4703966363e86ad7094378a18dc5745e80eb3c5cb9a77e9a00522ef740ba2771c0269481f5e39513cf996ce331296c4dbb10c44249802ebc7d2c4589d1862d1a5a2ff0d4512dad378c09580f32016057ade0ebc90420f52a34cc980960a5150d09c3531950cc06cd3eee1408fdaeb2b2b4d50d80f2874d155f7d33a64e3e16a78e9e550ea642924e6c320b05f599407567faf0ddaf58d4ef4ed9babc9a211d4c38d6b233cf4a28fd585f5cc954a01b61e4ca6b47a", 0xca, 0x2}], 0xc0400, &(0x7f0000000680)={[{@uni_xlate}, {@utf8}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'macinuit'}}, {@uni_xlateno}, {@utf8}, {@shortname_mixed}, {@numtail}, {@rodir}, {@nonumtail}], [{@appraise_type}, {@smackfshat={'smackfshat', 0x3d, '.'}}, {@smackfsroot={'smackfsroot', 0x3d, 'rpc_pipefs\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x32, 0x63, 0x64, 0x66, 0x30, 0x33, 0x34], 0x2d, [0x0, 0x35, 0x34, 0x63], 0x2d, [0x66, 0x34, 0x37, 0x65], 0x2d, [0x62, 0x64, 0x61, 0x38], 0x2d, [0x37, 0x32, 0x62, 0x66, 0x66, 0x35, 0x61, 0x34]}}}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:28:37 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @loopback}}, &(0x7f00000002c0)=0x1c, 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:28:53 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4032, 0x0, 0x7f, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000880)=ANY=[@ANYBLOB="6669060000000800000188983a7237fc9753dc55e91c37d760ce961f942798b599828677b6d94ce8fdd2347c7dbbd9b30fcd92e8f23b845a7d95357e3b0b54672f33a17772cf04a6bc6cf7737505b474a474b4443dbecaccc95d30473e12326378072f5ce3d7f1ae7dec70f90a1be85de9a41e7a4d2cac15d31f992b3a"], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000007c0)) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) rename(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/../file0\x00') recvmsg$unix(r1, &(0x7f0000000140)={&(0x7f0000000500), 0x6e, &(0x7f0000000080)=[{&(0x7f0000000580)=""/119, 0x77}], 0x1, &(0x7f0000000600)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c0000000000000001af46c5a5c7fcb2", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1f000000"], 0xf8}, 0x10000) r4 = openat2(r1, &(0x7f0000000340)='./file0/../file0\x00', &(0x7f0000000700)={0x102, 0x1, 0x10}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x1f, 0x0, 0x3, 0x3, 0x0, 0x9, 0xd0502, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0x4, 0x8}, 0x200, 0x7ff, 0x40, 0x0, 0x6, 0x16e, 0xa168, 0x0, 0x5, 0x0, 0x1b445274}, r3, 0x8, r4, 0xa) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:28:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100), 0x4002000000000000}], 0x1}, 0x10044001) 10:28:53 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) r4 = socket$inet_icmp(0x2, 0x2, 0x1) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000500)={'broute\x00', 0x0, 0x0, 0x0, [0x3, 0x1, 0x7, 0x1000, 0x0, 0x80000000000]}, &(0x7f0000000100)=0x78) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:28:53 executing program 5: clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000080)={r0, r1+60000000}, &(0x7f00000001c0)) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:28:53 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x2f00, 0x0) 10:28:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_io_uring_complete(0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000240), &(0x7f0000000280)=0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$HIDIOCGCOLLECTIONINFO(r2, 0xc0104811, &(0x7f00000001c0)={0x2, 0x94, 0x80, 0x80}) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:28:53 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000100)=ANY=[@ANYBLOB="66690fccf63e2e6ae18eee4f776c7465720800000004454bcdab28eb4479e34f8e2e38e6cdef64e463e070ff06bb98f0faacaf02c07f990ce3fd5ec63fb88a837a4c85b47060d4085e03bf6d9a5abcc98c717efbe7af67"], 0x28) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) fallocate(r1, 0x10, 0x8, 0x40) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:28:54 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) sendmsg$IPSET_CMD_FLUSH(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8010821}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x34, 0x4, 0x6, 0x401, 0x0, 0x0, {0xe, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x4040000}, 0x20040010) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:28:54 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x3f00, 0x0) 10:28:54 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x101, 0xe1a9}}, './file0/../file0\x00'}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:28:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100), 0xffffff7f00000000}], 0x1}, 0x10044001) 10:28:54 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0xfffffffffffffd8d, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f, 0x7, 0x0, 0xfffffffd, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:28:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x8}, 0x10044001) 10:28:54 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x4000, 0x0) 10:28:54 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0xfffffe01, @loopback, 0x8}}, 0x0, 0x0, 0x2b, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:28:54 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001}, 0x41200, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000500)={0x53, 0xfffffffffffffffd, 0x22, 0xf7, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000440)="95cd218f7ed1334cf1f91087fb1d49de2d63cf8bf039d17d41b1b5dd8c5b4ee5ad71", &(0x7f0000000680)=""/228, 0x1, 0x0, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) creat(&(0x7f0000000040)='./file0/../file0\x00', 0xa5) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x4e20, 0x0, @remote, 0x8}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a901483d263539e48f6f890080000000000000078ef10c61a0c665e1bac7cc4913fa56e070060c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1060000002aba00"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r4, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/79, 0x4f}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:28:54 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) quotactl(0x9, &(0x7f0000000040)='./file0/../file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000500)="55c8281f4d13abda9567a6701b61b42fb3ec54c7094457c42437ef88c54ff72ceb2a55240f5d2747f3a7b58895b0481f827e079223e509c19df7f2aa585f7480122363ac26333b16e07362f7d0f058baace7c8841426ff70dff6e1d9c96d58d11e8e896770c4c4a5abce6c0c51cf6bad4185819df801490ef0be48d06daf2ac2694adb813d49862e42c7333761bd5f4b885e966013ad919d50e412070dab05dad32b4c4505f777558c450ba718cea4f81f8f71070610295c0d47bc8f79a6aa3eebc8959c2d46729e8aa5cc338240e58915b8fa41ed369dc866b452581297d25b2390") mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:28:54 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) socket$inet_tcp(0x2, 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r0, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x2000, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) [ 3214.289315] sd 0:0:0:0: [sg0] tag#0 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 3214.290647] sd 0:0:0:0: [sg0] tag#0 CDB: opcode=0x95 [ 3214.291302] sd 0:0:0:0: [sg0] tag#0 CDB[00]: 95 cd 21 8f 7e d1 33 4c f1 f9 10 87 fb 1d 49 de [ 3214.292520] sd 0:0:0:0: [sg0] tag#0 CDB[10]: 2d 63 cf 8b f0 39 d1 7d 41 b1 b5 dd 8c 5b 4e e5 [ 3214.295265] sd 0:0:0:0: [sg0] tag#0 CDB[20]: ad 71 10:29:10 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x13404ad00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:29:10 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0x400}}, './file0/../file0\x00'}) 10:29:10 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="df722fd1964ea16d65f7"], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x13) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r3, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000040)={0x1, 0x100000001}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xc080, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:29:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x300}, 0x10044001) 10:29:10 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x7203, 0x0) 10:29:10 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="9db9c1f9670ea6cbb8a3c6ba"], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="66696c746572e300000071fa1cce491857e68d6ab128e78200000000bb08af1f1bb82a7044e5f7ae91df48aba9145b58f08fcac1caf044c22a08731a7b7a78a8d65cc7027a2fba6e591ea157c7fd000478ff5093923434aa196f0a0f83faffe241614208376c9ca3fd12507cbfbc9300ebe3b6511c8800e215c453b4ab2dff8fe9e8480400c35f1b6b74a1cc4c6e2b144bb561c40f7478c749034fd6c1447cc959ce0535aa0d6a9c937971f89fd808f003b882db89b20000000000"], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) ioctl$BTRFS_IOC_DEFRAG(r2, 0x50009402, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r2, 0xf505, 0x0) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:29:10 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0xfc, 0x20, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x122, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:29:10 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000002c0)=ANY=[@ANYBLOB="66696c74657208000000bd0a2fae3bdb9b8be501dd1da18748308ea46bd955b0bb8442f9470f56742cb0413256080424ac073198d2d43df991c94e3697ada54c3095f8916dd6b471102ac234b4023d58467784"], 0x28) socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:29:10 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x7503, 0x0) 10:29:10 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) dup2(r0, r2) bind(r2, &(0x7f00000007c0)=@can, 0x80) r3 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) accept(r3, &(0x7f0000000340)=@pppol2tpv3in6, &(0x7f00000001c0)=0x80) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x4) r4 = openat2(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f0000000600)={0x20000, 0x2, 0x4}, 0x18) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x4e20, 0x8, @private0, 0x8}}, 0x0, 0x0, 0x13, 0x0, "f455717312dbf54c3fd2f36c0530105b7ff546d3f66a3df407d64d4ece0d2ddb9d4e38f623dab817260049180c06d58f6e107820e9705df4fcd7fa09efca98b61da006630ddc2c22305e2ae4adf2645f"}, 0xd8) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000004c0), 0x12800, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8936, &(0x7f0000000680)={@empty, 0x21}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:29:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x1, 0x0, 0xa}, 0x10044001) 10:29:10 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) copy_file_range(r0, &(0x7f0000000080)=0xe38b, r1, &(0x7f0000000140)=0x7f2, 0x80000000, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) recvmmsg$unix(r2, &(0x7f0000004780)=[{{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/17, 0x11}, {&(0x7f0000000500)=""/190, 0xbe}, {&(0x7f00000005c0)=""/177, 0xb1}, {&(0x7f0000000300)=""/29, 0x1d}, {&(0x7f0000000680)=""/151, 0x97}], 0x5}}, {{&(0x7f00000007c0), 0x6e, &(0x7f0000000340)=[{&(0x7f0000000840)=""/109, 0x6d}, {&(0x7f00000008c0)=""/80, 0x50}, {&(0x7f0000000940)=""/4096, 0x1000}], 0x3}}, {{&(0x7f0000001940)=@abs, 0x6e, &(0x7f00000019c0), 0x0, &(0x7f0000001a00)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc0}}, {{&(0x7f0000001ac0)=@abs, 0x6e, &(0x7f0000001d00)=[{&(0x7f0000001b40)=""/128, 0x80}, {&(0x7f0000001bc0)=""/139, 0x8b}, {&(0x7f0000001c80)=""/1, 0x1}, {&(0x7f0000001e00)=""/199, 0xc7}, {&(0x7f0000001cc0)=""/7, 0x7}], 0x5, &(0x7f0000001f00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x110}}, {{&(0x7f0000002040)=@abs, 0x6e, &(0x7f0000004180)=[{&(0x7f00000020c0)=""/132, 0x84}, {&(0x7f0000002180)=""/4096, 0x1000}, {&(0x7f0000003180)=""/4096, 0x1000}], 0x3}}, {{&(0x7f00000041c0), 0x6e, &(0x7f0000004340)=[{&(0x7f0000004240)=""/209, 0xd1}], 0x1}}, {{&(0x7f0000004380)=@abs, 0x6e, &(0x7f0000004480)=[{&(0x7f0000004400)=""/14, 0xe}, {&(0x7f0000004440)=""/9, 0x9}], 0x2}}, {{&(0x7f00000044c0), 0x6e, &(0x7f00000046c0)=[{&(0x7f0000004540)=""/201, 0xc9}, {&(0x7f0000004640)=""/87, 0x57}], 0x2, &(0x7f0000004700)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}], 0x70}}], 0x8, 0x120, &(0x7f0000004980)) mkdirat(r3, &(0x7f00000049c0)='./file0\x00', 0x144) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:29:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x1, 0x0, 0x240}, 0x10044001) 10:29:10 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x8f00, 0x0) 10:29:10 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x3}, 0x224, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r2 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) clone3(&(0x7f0000000680)={0x4000000, &(0x7f0000000140)=0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000300), {0x5}, &(0x7f0000000500)=""/164, 0xa4, &(0x7f0000000780)=""/160, &(0x7f0000000340)=[0xffffffffffffffff, 0x0, 0x0], 0x3, {r4}}, 0x58) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000700)=0x400) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000740)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000000f139624fde199fed6ce53100"]) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r5, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:29:10 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x48, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:29:10 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x47a01, 0x6, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x30000, 0x60) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x2) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) r4 = syz_open_dev$vcsu(&(0x7f0000000140), 0xff, 0x92000) sendmsg$NL80211_CMD_SET_NOACK_MAP(r4, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="14cc678d", @ANYRES16=0x0, @ANYBLOB="000129bd7000fbdbdf25570000000ef3f3127a3be758194db5d5a1565df49d58002f051922a1ef7ea85966a04b620da53b325d173d5ee8bf4aad614115e0b524f65fe01036105c75f7f05e18b3de33b0941e37785a505f864911b5b18a6dd525a12788e5b6b481"], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:29:10 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x44000, 0x0, 0x7f, 0x9, 0x0, 0x2, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = fsmount(r2, 0xa19cc8d3ee51468, 0x9) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000001840), 0x4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) fstat(r0, &(0x7f0000000240)) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) dup2(r2, r0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 10:29:24 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="66698c74657208000000"], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:29:24 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000600)={0x2, 0xe9, "51932abedd32c4211b5ef13332396efb403c8627ec16409f7742dbe6c2db1290a8a3272a1db36c18ad4f20199c5d2b70f2ddcf2be63be560ff483eba68c2e21e2f5c1f705beea09eae07f0db2bd72fcf436280ddba54df7b71a67999310f13737a0f9e65fe5d586c6189ffa5b948add3e3899705d2ffaf823f15da85220c8bc3913c2d0107d580f146fdb686ad5ef1f2346956abfa4c2a391421cc73a3a07be4a3bba9ef54187dcabe80a34f09062bc991e3c8c7b25a464d34674aa848f24cb199a8dc68cdfeed6ebbb858062c28f01e7d3b74b16e5401cd45f8b051f0828ce4fa6f655aa66afa240b"}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) 10:29:24 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280), 0x101001, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x20002000, 0x0, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1}, 0x8) r3 = openat$cgroup_ro(r1, &(0x7f0000000240)='cgroup.kill\x00', 0x0, 0x0) r4 = fork() fcntl$setown(r3, 0x8, r4) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r5, 0x8008f513, &(0x7f00000001c0)) 10:29:24 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) mount$bind(&(0x7f0000000340)='./file0/../file0\x00', &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000005c0), 0x1088080, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="66696c94654d080000ba5f78cbe40f3f994ad9f659f3732c85c609f82386b8aaa51e6232327fb330cbc33e35765233407aeecaa7cf73a08056e43111d0f152a212c8f2e54687da42df5917d7a90004dc3a5b423f525359bb90dcf1b2cfdb5f384e030566a783dde6feee539645b80f0270721f39630c25e004286f59a9b3e3dd7c455fb1fa1fcfc7414b6ed9ee05f3933a91e1d900"], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x28, 0x3f7, 0x8, 0x70bd25, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x44000}, 0x8000) 10:29:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x1, 0x0, 0xa00}, 0x10044001) 10:29:24 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xb903, 0x0) 10:29:24 executing program 4: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:29:24 executing program 2: mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB='filter\b\x00\x00\x00'], 0x28) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f00000001c0)={&(0x7f0000000240)=""/81, 0x51}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x134064500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) fchown(0xffffffffffffffff, 0xffffffffffffffff, r4) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x404041, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r5, 0xd0009412, &(0x7f0000000b40)={0x0, 0x5}) 10:29:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x1, 0x0, 0x4002}, 0x10044001) 10:29:25 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xe903, 0x0) 10:29:25 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xedc0, 0x0) 10:29:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x1, 0x0, 0x10020}, 0x10044001) [ 3245.012285] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1015 sclass=netlink_route_socket pid=83420 comm=syz-executor.3 10:29:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x0, 0x0, 0x2b, 0x0, "68a468381b057111610a7651a6b87094f75abc8b5fddca2af3d56ad3d6811ab622903a28aec21168151d2dbd11b57692a93a413722ce18e7a6aae13045afb39f3f62d9512ba6154f053b91dd30b35dff"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)}], 0x1, 0x0, 0xf0ff7f}, 0x10044001) [ 3245.091297] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1015 sclass=netlink_route_socket pid=83558 comm=syz-executor.3 10:29:25 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0xf000, 0x0) 10:29:25 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x19) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x0, 0x32, 0x0, "9c7b30476a9014e4429e9dae5283d26353be48f6f8908a9bfcb73333d893781110c61a0c665e5bc97cc5913fa56e044c60c043747a5ab35583acbdf8d207194aef52ea581230cd3b4baecec06dd3c1af"}, 0xd8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000040)=""/63, &(0x7f0000000140)=0x3f) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$BTRFS_IOC_RESIZE(r3, 0x50009403, &(0x7f00000001c0)={{r1}, {@void, @max}}) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e20, 0x6828, @private0, 0x30}}, 0x0, 0x0, 0x1c, 0x0, "8ac377679cb56eb19a704dc2d7e19eccdf4c8b27afb2d4d465ec3e75ce8324fd45cb364f2d81334f791ea272e6797188c1445080be2c346109bd4050feb4293292976b27d0bbd350e3ca9b0bed093fd7"}, 0xd8) [ 3245.105170] [ 3245.105370] ====================================================== [ 3245.106047] WARNING: possible circular locking dependency detected [ 3245.106747] 5.10.199 #1 Not tainted [ 3245.107137] ------------------------------------------------------ [ 3245.107801] syz-executor.5/83367 is trying to acquire lock: [ 3245.108410] ffff88800ee54b78 ((work_completion)(&hdev->bg_scan_update)){+.+.}-{0:0}, at: __flush_work+0xdd/0xa90 [ 3245.109563] [ 3245.109563] but task is already holding lock: [ 3245.110192] ffffffff85619468 (rfkill_global_mutex){+.+.}-{3:3}, at: rfkill_fop_write+0xff/0x4b0 [ 3245.111166] [ 3245.111166] which lock already depends on the new lock. [ 3245.111166] [ 3245.112037] [ 3245.112037] the existing dependency chain (in reverse order) is: [ 3245.112838] [ 3245.112838] -> #4 (rfkill_global_mutex){+.+.}-{3:3}: [ 3245.113569] __mutex_lock+0x13d/0x10b0 [ 3245.114042] rfkill_register+0x36/0xa10 [ 3245.114537] hci_register_dev+0x42e/0xc00 [ 3245.118699] __vhci_create_device+0x2c8/0x5c0 [ 3245.119491] vhci_open_timeout+0x38/0x50 [ 3245.120216] process_one_work+0x9a9/0x14b0 [ 3245.120973] worker_thread+0x61d/0x1310 [ 3245.121679] kthread+0x38f/0x470 [ 3245.122309] ret_from_fork+0x22/0x30 [ 3245.122969] [ 3245.122969] -> #3 (&data->open_mutex){+.+.}-{3:3}: [ 3245.124017] __mutex_lock+0x13d/0x10b0 [ 3245.124707] vhci_send_frame+0x63/0xa0 [ 3245.125414] hci_send_frame+0x1b9/0x320 [ 3245.126120] hci_tx_work+0x10af/0x1660 [ 3245.126817] process_one_work+0x9a9/0x14b0 [ 3245.127527] worker_thread+0x61d/0x1310 [ 3245.128197] kthread+0x38f/0x470 [ 3245.128779] ret_from_fork+0x22/0x30 [ 3245.129450] [ 3245.129450] -> #2 ((work_completion)(&hdev->tx_work)){+.+.}-{0:0}: [ 3245.130331] __flush_work+0x105/0xa90 [ 3245.130806] hci_dev_do_close+0x131/0x1240 [ 3245.131330] hci_unregister_dev+0x149/0x430 [ 3245.131857] vhci_release+0x70/0xf0 [ 3245.132320] __fput+0x285/0x980 [ 3245.132737] task_work_run+0xe2/0x1a0 [ 3245.133209] do_exit+0xb6f/0x2600 [ 3245.133650] do_group_exit+0x125/0x310 [ 3245.134137] get_signal+0x4bc/0x22f0 [ 3245.134605] arch_do_signal_or_restart+0x2b7/0x1990 [ 3245.135212] exit_to_user_mode_prepare+0x10f/0x190 [ 3245.135813] syscall_exit_to_user_mode+0x38/0x1e0 [ 3245.136397] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3245.137015] [ 3245.137015] -> #1 (&hdev->req_lock){+.+.}-{3:3}: [ 3245.137712] __mutex_lock+0x13d/0x10b0 [ 3245.138184] bg_scan_update+0x82/0x500 [ 3245.138649] process_one_work+0x9a9/0x14b0 [ 3245.139158] worker_thread+0x61d/0x1310 [ 3245.139634] kthread+0x38f/0x470 [ 3245.140052] ret_from_fork+0x22/0x30 [ 3245.140496] [ 3245.140496] -> #0 ((work_completion)(&hdev->bg_scan_update)){+.+.}-{0:0}: [ 3245.141417] __lock_acquire+0x29e7/0x5b00 [ 3245.141912] lock_acquire+0x197/0x470 [ 3245.142369] __flush_work+0x105/0xa90 [ 3245.142827] __cancel_work_timer+0x368/0x4c0 [ 3245.143347] hci_request_cancel_all+0x73/0x230 [ 3245.143888] hci_dev_do_close+0xd9/0x1240 [ 3245.144382] hci_rfkill_set_block+0x166/0x1a0 [ 3245.144911] rfkill_set_block+0x1fd/0x540 [ 3245.145415] rfkill_fop_write+0x253/0x4b0 [ 3245.145915] vfs_write+0x29a/0xa70 [ 3245.146351] ksys_write+0x1f6/0x260 [ 3245.146795] do_syscall_64+0x33/0x40 [ 3245.147256] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3245.147854] [ 3245.147854] other info that might help us debug this: [ 3245.147854] [ 3245.148699] Chain exists of: [ 3245.148699] (work_completion)(&hdev->bg_scan_update) --> &data->open_mutex --> rfkill_global_mutex [ 3245.148699] [ 3245.150243] Possible unsafe locking scenario: [ 3245.150243] [ 3245.150892] CPU0 CPU1 [ 3245.151394] ---- ---- [ 3245.151896] lock(rfkill_global_mutex); [ 3245.152342] lock(&data->open_mutex); [ 3245.153024] lock(rfkill_global_mutex); [ 3245.153739] lock((work_completion)(&hdev->bg_scan_update)); [ 3245.154385] [ 3245.154385] *** DEADLOCK *** [ 3245.154385] [ 3245.155024] 1 lock held by syz-executor.5/83367: [ 3245.155531] #0: ffffffff85619468 (rfkill_global_mutex){+.+.}-{3:3}, at: rfkill_fop_write+0xff/0x4b0 [ 3245.156544] [ 3245.156544] stack backtrace: [ 3245.157038] CPU: 0 PID: 83367 Comm: syz-executor.5 Not tainted 5.10.199 #1 [ 3245.157774] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3245.158656] Call Trace: [ 3245.158948] dump_stack+0x107/0x167 [ 3245.159345] check_noncircular+0x263/0x2e0 [ 3245.159799] ? register_lock_class+0xbb/0x17b0 [ 3245.160283] ? print_circular_bug+0x470/0x470 [ 3245.160789] ? find_first_zero_bit+0x94/0xb0 [ 3245.161275] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 3245.161756] __lock_acquire+0x29e7/0x5b00 [ 3245.162218] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3245.162780] ? SOFTIRQ_verbose+0x10/0x10 [ 3245.163220] ? tracing_generic_entry_update+0x1ed/0x270 [ 3245.163797] lock_acquire+0x197/0x470 [ 3245.164201] ? __flush_work+0xdd/0xa90 [ 3245.164628] ? lock_release+0x680/0x680 [ 3245.165049] ? __flush_work+0x78c/0xa90 [ 3245.165490] ? lock_downgrade+0x6d0/0x6d0 [ 3245.165954] __flush_work+0x105/0xa90 [ 3245.166360] ? __flush_work+0xdd/0xa90 [ 3245.166782] ? lock_chain_count+0x20/0x20 [ 3245.167231] ? queue_delayed_work_on+0xe0/0xe0 [ 3245.167724] ? mark_lock+0xf5/0x2df0 [ 3245.168133] ? lock_acquire+0x197/0x470 [ 3245.168559] ? find_held_lock+0x2c/0x110 [ 3245.169016] ? __wake_up_common_lock+0xde/0x140 [ 3245.169536] ? mark_held_locks+0x9e/0xe0 [ 3245.169990] __cancel_work_timer+0x368/0x4c0 [ 3245.170468] ? try_to_grab_pending+0xe0/0xe0 [ 3245.170961] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3245.171537] ? cancel_delayed_work+0x1b8/0x2b0 [ 3245.172040] ? cancel_delayed_work_sync+0x20/0x20 [ 3245.172581] hci_request_cancel_all+0x73/0x230 [ 3245.173085] hci_dev_do_close+0xd9/0x1240 [ 3245.173544] ? rfkill_set_block+0x18f/0x540 [ 3245.174024] ? hci_dev_open+0x350/0x350 [ 3245.174455] ? mark_held_locks+0x9e/0xe0 [ 3245.174907] hci_rfkill_set_block+0x166/0x1a0 [ 3245.175394] ? hci_power_off+0x20/0x20 [ 3245.175819] rfkill_set_block+0x1fd/0x540 [ 3245.176280] rfkill_fop_write+0x253/0x4b0 [ 3245.176740] ? rfkill_sync_work+0xa0/0xa0 [ 3245.177211] ? security_file_permission+0x24e/0x570 [ 3245.177762] ? rfkill_sync_work+0xa0/0xa0 [ 3245.178221] vfs_write+0x29a/0xa70 [ 3245.178619] ksys_write+0x1f6/0x260 [ 3245.179015] ? __ia32_sys_read+0xb0/0xb0 [ 3245.179467] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3245.180038] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3245.180603] do_syscall_64+0x33/0x40 [ 3245.181012] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3245.181581] RIP: 0033:0x7f818d912b19 [ 3245.181984] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3245.183966] RSP: 002b:00007f818ae88188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3245.184799] RAX: ffffffffffffffda RBX: 00007f818da25f60 RCX: 00007f818d912b19 [ 3245.185599] RDX: 0000000000000008 RSI: 00000000200000c0 RDI: 0000000000000005 [ 3245.186378] RBP: 00007f818d96cf6d R08: 0000000000000000 R09: 0000000000000000 [ 3245.187150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3245.187926] R13: 00007ffda8f5a5bf R14: 00007f818ae88300 R15: 0000000000022000 VM DIAGNOSIS: 10:29:25 Registers: info registers vcpu 0 RAX=000000000000005f RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822ca1d1 RDI=ffffffff879e81e0 RBP=ffffffff879e81a0 RSP=ffff88805759f1d0 R8 =0000000000000001 R9 =0000000000000003 R10=0000000000000000 R11=0000000000000001 R12=000000000000005f R13=000000000000005f R14=ffffffff879e81a0 R15=dffffc0000000000 RIP=ffffffff822ca228 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f818ae88700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2d020000 CR3=0000000058866000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00007f818d9f97c000007f818d9f97c8 XMM02=00007f818d9f97e000007f818d9f97c0 XMM03=00007f818d9f97c800007f818d9f97c0 XMM04=ffffffffffffffffffffffff00000000 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=0000000000000040 RCX=ffffffff81271d48 RDX=0000000000000000 RSI=0000000000000201 RDI=ffff8880088a88d8 RBP=ffff88800804d640 RSP=ffff8880088b7d00 R8 =0000000000000000 R9 =ffffffff856725cf R10=0000000000000000 R11=0000000000000001 R12=ffffffff816ef9ea R13=0000000000102cc0 R14=0000000000092cc0 R15=0000000000092cc0 RIP=ffffffff83e4de41 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f0cab75c900 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f0caae32cec CR3=000000000ea8e000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000000000000000000000 XMM03=00000000ffffffff0000000000000000 XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=0000557ab25d4c800000557ab255ab10 XMM06=00000000000000000000557ab25eaf90 XMM07=00000000000000000000000000000000 XMM08=2f727474612f666c65732d6461657268 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000200000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000