_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "c009b39830e4109622d7a29d0bd42e6d365c8384f665a2104b6faaa5427626b93311e77f0de4211e1217bc355a5246327eb7ba126bf7e4adb45535a4d9757c77f555e42c9254e9f9089be590271f821f5f6b632da2dabf1d6e618629da57a34a33f5e913338e628f32d84f60dbb9f94b70f1828e7d652bb2443c02901738d15cd72d14288f0d47dfe96e49988d0402f96628f97be361723e018daf71ab695fa4726664c00ec9aa53b8c092760da4cd088f03fad6504eceb8949dc35abc6c9f51916777bc38aa3669fb220546dbd1024eb87da205b46ec35180a8fcb898160855b5044023da75f2b1f285c1462a8afa95492a14be3f42052ff535612d226506a0", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x4, "9755154351ac9a"}) [ 1451.536580] Process accounting resumed ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005f040)={0x36bf0000000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {0x0, r4}, {}, {0x0, r9}], 0x1, "37830f5452783b"}) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r13 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r13, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) io_submit(0x0, 0x3, &(0x7f0000006280)=[&(0x7f0000004d80)={0x0, 0x0, 0x0, 0x8, 0x9, r1, &(0x7f0000004d40)="7b80c976438535b009dad39314", 0xd, 0x7, 0x0, 0x1, r2}, &(0x7f0000005200)={0x0, 0x0, 0x0, 0x6, 0x0, r0, &(0x7f0000005140)="943a176fc6fe7a67ecdab7901b1599bc614940ade1069a30a82707be62274e28b3de5d08f38313fd068dd2eeb19321b74159679b17a578e7b2b40daa698bd78d7707f8cb65dcb18db26ab418dfc9dc978c8ff33a66bc9772ec0dd34369611e4cc51e26320bc48b19fcb90cd26f7926f9364104b25a73deb458d942de8e93efa70bdc9280afb7d2901ad8b52fdccd56a2c4bf035af6f344970e01a661b94990dd", 0xa0, 0x7ff, 0x0, 0x0, r0}, &(0x7f0000006240)={0x0, 0x0, 0x0, 0x1, 0x8001, r0, &(0x7f0000005240)="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", 0x1000, 0x7, 0x0, 0x2, r13}]) creat(&(0x7f0000000540)='./file0\x00', 0x0) 13:25:18 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r2, &(0x7f0000000080), &(0x7f00000000c0)=@v3={0x3000000, [{0x0, 0x8}, {0x6}], 0xee00}, 0x18, 0x3) fallocate(r0, 0x0, 0x0, 0x8800000) r4 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd=r4, 0x0, 0x0, 0x0, 0x2279af253078ed18}, 0x0) r7 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd=r7, 0x0, 0x0, 0x0, 0x2279af253078ed18}, 0x0) io_uring_enter(r7, 0x58ab, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r7, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x1, 0x7, 0x5, 0x3f, 0x3, 0x6, 0xcec7, 0x17d, 0x40, 0x207, 0x0, 0x2, 0x38, 0x1, 0x101, 0x3, 0xfffd}, [{0x6, 0x1ff, 0x8, 0x6, 0x2, 0x200, 0x81, 0x9}], "cac08ae2383c4fb0fb92f610608c85b2a6802492a5450af2a0ec11998fd462e8f55af161c9821dd94f7d34267776b07dd8b20aa2076a06071486f06d785f0c0956e903d3736c72abf23ee9f4f4ef88b124fe05b45e7e5e2205b987b2bf3789b2f01d7b6a9045", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5de) io_uring_enter(r4, 0x58ab, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r4, 0x0, r0) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fsmount(r10, 0x0, 0xf8) socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e24, @remote}, 0x10) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r10, 0xc0189372, &(0x7f0000000180)={{0x1, 0x1, 0x18, r3, {0x80}}, './file0\x00'}) read$usbmon(r11, &(0x7f0000000940)=""/4096, 0x1000) 13:25:18 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x16c, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:25:18 executing program 3: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x138, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:25:18 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x5385, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:25:18 executing program 0: ioctl$BTRFS_IOC_QGROUP_CREATE(0xffffffffffffffff, 0x4010942a, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b07, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[{0x0}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="64614d073961d1cd1730303030303030303030303030303030303030302c6572726f72733d636f6e74696e75652c646f6e745f61707072616973652c736d61636b667372c22900000000000061636b6602006f6f94e12d403a2e2b5b2942235a31d9d3924376d81720dc5d356a5ce50d92b3eea940b9b1504d79efe11919574a384610761c0f3625e36eb1b5416990e4ef56b0fff535d404d8874309e0"]) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) 13:25:19 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0xfffffffb, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)=""/250, 0xfa}, {&(0x7f00000014c0)=""/186, 0xba}, {&(0x7f0000001580)=""/175, 0xaf}], 0x3, 0x10001, 0x2) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x1010, r0, 0x10000000) io_setup(0x5, &(0x7f0000000700)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fd/3\x00') io_submit(r1, 0x1, &(0x7f00000006c0)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}]) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0xb054}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000100)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r5}}, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:25:19 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x186, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:25:19 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 1451.689682] blktrace: Concurrent blktraces are not allowed on sg0 [ 1451.702612] blktrace: Concurrent blktraces are not allowed on sg0 13:25:32 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0xfffffffb, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)=""/250, 0xfa}, {&(0x7f00000014c0)=""/186, 0xba}, {&(0x7f0000001580)=""/175, 0xaf}], 0x3, 0x10001, 0x2) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x1010, r0, 0x10000000) io_setup(0x5, &(0x7f0000000700)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fd/3\x00') io_submit(r1, 0x1, &(0x7f00000006c0)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}]) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0xb054}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000100)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r5}}, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:25:32 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x65) dup2(r1, r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="1200000026000000000000f8ffffffffffffff001800008008000000", @ANYRES32=0xee00, @ANYBLOB='\f\x00'/12], 0x2c}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) 13:25:32 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:25:32 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x100) sendmsg$nl_xfrm(r1, &(0x7f0000001700)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000016c0)={&(0x7f0000001640)=@getae={0x4c, 0x1f, 0x20, 0x70bd2c, 0x25dfdbff, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d4, 0xa, 0x85214112f556ed61}, @in=@empty, 0xc0d, 0x3500}, [@offload={0xc, 0x1c, {0x0, 0x2}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x4000040) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="48010000100001000000000000000000ac1e00010000000000000000333d0000fe8080000000000000000000000000aa00"/64, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="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"], 0x148}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000001) sendmsg$DEVLINK_CMD_SB_GET(r2, &(0x7f0000001880)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000001740)={0x124, 0x0, 0x100, 0x70bd26, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xfffffbff}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x101}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x938}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x81}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xfcc4}}]}, 0x124}, 0x1, 0x0, 0x0, 0x200008d6}, 0x4000) statfs(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)=""/151) sendmsg$DEVLINK_CMD_SB_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="481272c6", @ANYRES16=0x0, @ANYBLOB="00022dbd7000fedbdf250b000000080001007063690011000200303030303a30303a31302e300000000008000b00010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b0080000000080001007063690011000200303030303a30303a31302e300000000008000b00aeffffff"], 0x84}, 0x1, 0x0, 0x0, 0x8000}, 0x24000091) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) fsmount(r1, 0x1, 0x8a) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000015c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file1\x00'}) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) mknodat$null(r1, &(0x7f0000000440)='./file0\x00', 0x100, 0x103) ioctl$EXT4_IOC_GETSTATE(r3, 0x40046629, &(0x7f0000000080)) 13:25:32 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488404cabd15439f170e429dd5057d7d5db566fc9e4cab1128bce328ef54be2ac02ea82a613a077c2508b07638c2da855795a8523c7986a4979fc9300627bae481812a27b8f8d511a4dfbfc9680cf5c993b89f8efb3de820ef8e9bd306955000037976789cf995521a65b9192b2dde0498242f3042690688050b620e188a301b717bf204eb12a7fcd85332358a4e595f838fbe8e29ca7b0315e9f9e74ba8f08031384702d819754"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:25:32 executing program 3: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x138, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:25:32 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x5386, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:25:32 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x186, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1465.212121] blktrace: Concurrent blktraces are not allowed on sg0 [ 1465.214355] blktrace: Concurrent blktraces are not allowed on sg0 [ 1465.221868] Bluetooth: hci0: load_link_keys: expected 3 bytes, got 38 bytes 13:25:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = openat(r1, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) sendfile(r2, r4, 0x0, 0x80000001) creat(&(0x7f00000000c0)='./file1\x00', 0x0) sendmmsg$unix(r1, &(0x7f0000006940)=[{{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000040)='`', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000001740)=',', 0x1}], 0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="100000000000000100000001008e3f003158239775529147e8468c773fc78c04ff8a5bd3e60355e75ed78b8cfc0025f6eb3938b3a8dc8e6249ec74882ce9b6f978da745c62cfd690db8abbaee46b57ab3b1d09970145ef29b22c01f873e9a9bb8e801cbd30cb9450a44919d0ea00fa0b01a55bdd7305630138ed168dae39fd76ee8b6cc6ce323621aa6b6698e3e13967c4b9bd4d52937d2cba4aa9fffb0fc44108af02094e5452ad83b71b01b7772442e6a5888d23eb3b9d76971fa2680cea9808", @ANYRES32=r1], 0x10}}], 0x2, 0x0) 13:25:32 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x541b, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:25:32 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x2000) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0xdc48}, 0x8) r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3c1}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x100000a, 0x11, r1, 0x8000000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = fsmount(r2, 0x0, 0xf8) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000013c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@private2}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r4, 0x0, 0x0, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f00000003c0)=""/83, 0x53, 0x1, &(0x7f0000002e40)=""/4092, 0xffc}, &(0x7f00000001c0)=0x40) close(0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r4, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2c030000140000032abd7000ffdbdf253b0791000100ed785ce082cb9d6e46c6ed6417e94d9c00f3b27fcb4325ad9ba72a3b31bcb53e22c28f6212c88c21fb3d0157279eb3666d0ba8827389bd6de9151782ce07b9aaecb08b20dbcf1908843aa9859286f18b1e50b6f42ccf0dd4efc04005684219b46a1feccd3056bfce8525214c4ac1f9ef10ada7a45716cc1789c8a3a9323cd4a4a3068369d16dcb1e6c000000cb000100fd0715937648a9cd4b2f8db5bec4f5142cd7b47e83fb36a7c1e5de4fcd8d8968bc6eac6e03ca6f7262dd5897575e5d58f28ba84a29e7fd5ba85b4ec4f82d195ae00a4c6d266b3993c7ff025bd9031d3e0facb46f78fbaae7c477ed90d461445d5b304855c11306b678049f2512cf3a0dc8af0c7525d988fc8469b9a4c12da0150bf5fb5aaa940c9d972aee331b4f241e97e305b510e402a5887f5751923d2f55af9d549071ee27302eebd5edc2f736395cf96eae35c78bce7d75418debe49d50c96c68b05dce12003700010008c01525a25634c3021323e44b1228339037be05500f4480b5f1ee831ea5564ec920b40a72000000019613aa696aae7a1575710012000100d1261666cf1b4e56051c827e3ee4480000a30001008106f044555daa7bce91cf509a25905c56031fcea5ba5ac2c491d6033048f7e1eef91f52395d5cc061032ad6a8142951241ad58be582ee8e4b19d6330a29634b1eeb3a0045425fcd7b9109de4aa67229d7f297ceed092ebac14939e2c788288ea6e54ed7dec7a99d63f284d080c2593782717f74024713d15d75891999336e565f606092c9d3d7f75d52bd5d2902c38652b72166485b670b442120a9ade63c00c5000100786d47ee45a8f74da6e84f4bce7b64417dd3940ad7f723bb76792d7f4d5927ba40e169c803cf6a2d4e55a101504bf52099d0cddc3040beb7481621d10cc35a71a3289330d3667a3918e1b122159a2ba1964d77099944cdb756a8ecc0a76da6bc10af4e4bb83796f685951fb835701031238d013a9c17f471e67052564514cc764a11708fdc1a9fa6da7a34b6939ca39e6c23d043cad498a2c680a43b15142253e2890322c26180005558f100dcaf3015711a134bfe8c3f860b8b5079a57f2037a9000000000000000000275f25ebdc377a7abd818a277abd131e31f3"], 0x32c}, 0x1, 0x0, 0x0, 0x40}, 0x10) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) 13:25:32 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x186, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1465.323783] blktrace: Concurrent blktraces are not allowed on sg0 [ 1465.334103] blktrace: Concurrent blktraces are not allowed on sg0 13:25:32 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg2\x00'}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_LBT_MODE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x2c, r3, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) read$hiddev(r1, &(0x7f0000000280)=""/175, 0xaf) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0), r2) sendmsg$NL802154_CMD_SET_TX_POWER(r6, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x1c, r7, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2404c015}, 0x4000) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) r8 = signalfd4(r4, &(0x7f0000000040)={[0x9]}, 0x8, 0x800) ioctl$PERF_EVENT_IOC_RESET(r8, 0x2403, 0x5) 13:25:32 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x5421, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) [ 1465.380967] audit: type=1400 audit(1686921932.789:30): avc: denied { map } for pid=10498 comm="syz-executor.0" path="pipe:[35141]" dev="pipefs" ino=35141 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=fifo_file permissive=1 13:25:32 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0xfffffffb, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)=""/250, 0xfa}, {&(0x7f00000014c0)=""/186, 0xba}, {&(0x7f0000001580)=""/175, 0xaf}], 0x3, 0x10001, 0x2) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x1010, r0, 0x10000000) io_setup(0x5, &(0x7f0000000700)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fd/3\x00') io_submit(r1, 0x1, &(0x7f00000006c0)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}]) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0xb054}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1465.437021] blktrace: Concurrent blktraces are not allowed on sg0 13:25:32 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x193, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1465.464244] blktrace: Concurrent blktraces are not allowed on sg0 13:25:32 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ff8000/0x8000)=nil, 0x8000, 0x3, 0x0, 0xfffffffffffffffa, 0x1) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/unix\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3e4bed71894973fa) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000014c0)={0x0, 0x0, 0x4, 0x0, '\x00', [{0x7, 0xfa, 0x8, 0xfff, 0x3f, 0x400}, {0x5, 0xffffffff, 0x1f, 0x3ff, 0x40, 0x3e}], ['\x00', '\x00', '\x00', '\x00']}) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') ptrace$setregset(0x4205, 0x0, 0x1, &(0x7f0000000040)={&(0x7f0000000180)="2d152838b8e8f13c75ef9a5d4d9ae83e58e4773ca98915e7f64e031f1acb7b81bf254e531ec757bc934c33cf3d4e5c1d6b496460ebb24b1da23f8ea45ee87a5a7d954f1f135d4958e05956c01e319b0ba8df175194e803", 0x57}) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r2 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000400), 0x2, 0x0) ftruncate(r2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x4a, &(0x7f0000000200), &(0x7f0000000240)=0x4) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)="a8a50e358180bc76edf3feb1b25144e5e231a81215", 0x15}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) getdents64(0xffffffffffffffff, &(0x7f00000007c0)=""/180, 0xb4) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x400000, 0x0) 13:25:32 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0xfffffffb, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)=""/250, 0xfa}, {&(0x7f00000014c0)=""/186, 0xba}, {&(0x7f0000001580)=""/175, 0xaf}], 0x3, 0x10001, 0x2) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x1010, r0, 0x10000000) io_setup(0x5, &(0x7f0000000700)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fd/3\x00') io_submit(r1, 0x1, &(0x7f00000006c0)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}]) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0xb054}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:25:33 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0xfffffffb, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)=""/250, 0xfa}, {&(0x7f00000014c0)=""/186, 0xba}, {&(0x7f0000001580)=""/175, 0xaf}], 0x3, 0x10001, 0x2) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x1010, r0, 0x10000000) io_setup(0x5, &(0x7f0000000700)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fd/3\x00') io_submit(r1, 0x1, &(0x7f00000006c0)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}]) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:25:33 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:25:46 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x5450, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:25:46 executing program 3: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000040)) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x6, "77004a6efdff000000deffff0100"}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) r1 = socket$inet(0x2, 0xa, 0x0) dup3(r1, r0, 0x0) 13:25:46 executing program 2: getxattr(0x0, 0x0, &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) [ 1479.294339] blktrace: Concurrent blktraces are not allowed on sg0 [ 1479.316442] blktrace: Concurrent blktraces are not allowed on sg0 [ 1479.343060] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11306 sclass=netlink_route_socket pid=10554 comm=syz-executor.0 13:25:46 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x193, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:25:46 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:25:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5e, 0x40400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x4, 0x0, 0x0, 0x40a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002a2cf564636d86b335000000000b00000400000009000080999e00009c00000080fe638d1dd04477ce053730a900c8c12d66511d498039dc3612d4d33b206414f9d7d6b2da7c467ef7cc4e2cf89c959207c47201158bdbea5ce9973105d9f0ba723ab44ffe0d8d1e8a23cda82908a69f1c6a"], 0x24}}, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/29, 0x1d}], 0x1) syz_io_uring_setup(0x203, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000140)) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0xffffffffffff69f3, 0x20}) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) sendfile(r2, r4, 0x0, 0x80000001) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000380)) setsockopt$sock_int(r5, 0x1, 0x3c, &(0x7f0000000240)=0x8, 0x4) 13:25:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r1, r2, 0x0, 0x20d315) clock_gettime(0x0, &(0x7f0000001ac0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000001a80)=[{{&(0x7f00000018c0)=@x25, 0x80, &(0x7f0000001a40)=[{&(0x7f0000001940)=""/26, 0x1a}, {&(0x7f0000001980)=""/144, 0x90}], 0x2}, 0x7}], 0x1, 0x40000043, &(0x7f0000001b00)={r3, r4+60000000}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r5, 0x0, 0x100000001) r6 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000001b40)='\x00', &(0x7f0000001b80), &(0x7f0000001bc0), 0x2, 0x5) sendfile(r0, r6, 0x0, 0x80000001) sendmmsg(r0, &(0x7f0000001880)=[{{0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000180)="1eeb104630b5f1d372f6f712405d4fe5943de780d498a0dcec2f2145fc0378ebe96d7720e67d139522f927a1c5f06426785d939edfaa38cc2cedb34574d4a63e0f", 0x41}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="29a653e4fbfe2c5d472dea150acf983ea87746f02bcf86f6389235f260b461f9c17eb1eac5fd22b225", 0x29}, {&(0x7f0000001240)="ebd40701d5deb85cca7aa25fc8a85d5065aca68bb2fb713d651300eb963c5229d50b296619a64a26f89b37e41be8ea547addd223d5f035f028de60c2027ce494628cc080d13f08a30cd66e4a37819a09479a7469609e433371cb7ec44cbc6bd45fda3e6057c575e6c0e0c9b194cb812ccf435d0d4f5f02a65de209ed0be5a446f88b", 0x82}, {&(0x7f0000001300)="5586c91637ee9998eb229374f9c4296eaeab11508f7bf479d89d9d4e7af14d801aeb9c3dcf6c4088517038df9e5cfae512918c5ac616bd541ec3590d86f476c17634774e25a91ab01dc5669240509fdfdc8a3b7e8cb5fd0a881f31954d8eeb04e5a28b081437b3447d992612773a6f68d46f4e7173cf6cc9f1d7901551ede8a4d20b5b0e78055ab55d2f058a", 0x8c}, {&(0x7f00000013c0)="3f9d0e767522805133161d643ca47c26b6d4d5c324937c7c31dbcd2bfad29c6bfb417e7aa2574bd2990ed8c7d468188f071f2e9ae0d777361ab0c9f3b104253fb85207d51bd0613c77233cac07b5678c0f75db21428647378a554cfc8b2eb41896da5699b947ba85ec9770f6d4ca44cc3efe81840df2133bed0c969d372f9c33aafd937197831e17e1de0eb87176bdfc72a55d463dd667639374eddc8902535289254eb7afffb43ad8eeead8195eb8b2493c2f3db6c6526b688d959889b1f9", 0xbf}, {&(0x7f0000001480)="61a3b7ad41ce599b1e31a1892ccb13be5179717f97fd7d3b6739b54ea3c97ced01dcae0f2b68965d8c0acf3cdfe1a23221735a440e46448a139b5d9fc6b3d3a161be2de1efc11c303b82e66b429d17d096d4f68a3d72d37c9bed1c4ecea6cc0ab8d1c251f0c3aa1bf0d8fb931044e34232a94a284e8364ce00387b3662da0eb80af39703899db3e832b5c7b806fa1e70aed250be2f2ae4d574a159ae41198781b240354271de73dd7f2108b595cdbee1004e35f12bd66dd6ebead3a6ee", 0xbd}], 0x7, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], 0x2b0}}], 0x1, 0x4000) r7 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x44) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x6000, 0x0) getdents(r7, &(0x7f0000000140)=""/61, 0x18) 13:25:46 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0xfffffffb, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)=""/250, 0xfa}, {&(0x7f00000014c0)=""/186, 0xba}, {&(0x7f0000001580)=""/175, 0xaf}], 0x3, 0x10001, 0x2) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x1010, r0, 0x10000000) io_setup(0x5, &(0x7f0000000700)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fd/3\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:25:46 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x5451, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:25:46 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x193, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1479.529412] blktrace: Concurrent blktraces are not allowed on sg0 [ 1479.538713] blktrace: Concurrent blktraces are not allowed on sg0 13:25:46 executing program 3: syz_open_dev$mouse(0x0, 0xfffffffffffffffd, 0xc042) syz_genetlink_get_family_id$batadv(&(0x7f0000001640), 0xffffffffffffffff) 13:25:46 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x19a, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1479.922337] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11306 sclass=netlink_route_socket pid=10554 comm=syz-executor.0 13:26:02 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:26:02 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x5452, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:26:02 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$DVD_READ_STRUCT(r1, 0x6, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x500) chown(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, r2) ioctl$TUNSETGROUP(r1, 0x400454ce, 0x0) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) socket$inet(0x2, 0x2, 0x10001) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) signalfd4(r3, &(0x7f0000000b80)={[0x5]}, 0x8, 0x80000) 13:26:02 executing program 4: rename(&(0x7f00000006c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x153}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(r1, 0x0, &(0x7f0000000140), 0x81800) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e21, @local}, 0x10) fcntl$getflags(r1, 0x40a) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000380)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@mcast1, 0x4e20, 0x8200, 0x0, 0x0, 0xa, 0x80}, {}, {}, 0xfffffffe, 0x6e6bbb}, {{@in6=@private1, 0x0, 0x6c}, 0x0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}}, 0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r1, &(0x7f0000000080)="a8bb77a50c50feb39cfa2b2796a1e7150d911823fb47f4c65e583986b4f103cae377c6b2b3c37974a8ebc67cae319f1d13787b48650bf14a6484d876c662c8c0f98ccbaed6c1e31c2107e51a302d7746acd7", 0x52, 0x40081, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/2341], 0x925) ftruncate(0xffffffffffffffff, 0x1000003) r2 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="6d706f6c3d7072656b65722c00d85cf69d59cdc2640fdc2957a346f18701843c5840d80f4b3445e9384c9a6a336fd2f9936f61d82bbd5210d0cf91ab2be0d203fd772f763744f59f6446ab37ffe44e522bbde12a121b10c121d9b871bb55dd5003a1e2e6bc44138aeaf47a3a9503f2c83690622187f3d81f2781eb8fe0e7f0b8f37d"]) mknodat$loop(r2, &(0x7f0000000240)='./mnt\x00', 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(r2, 0x4040942c, &(0x7f0000000100)={0x0, 0x9, [0x4, 0x81, 0x9, 0x1b35, 0x5, 0x4]}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') preadv2(r3, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x17) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000600)={0x1}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001200)=ANY=[@ANYBLOB="0100000001000000180000005b86dba6358198dde601e33ebb54c8a469c118244ae5a322d049d51d2e0f476fc3869b4053e3ede1b10672df7280e31bc69e2fec9dd05fd7f7bae0993ded466f12777d432866a86b75146e3a", @ANYRES32=r0, @ANYBLOB="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"]) unshare(0x48020200) 13:26:02 executing program 3: preadv2(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x6, 0x2) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x62) r1 = creat(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x3) openat(r2, 0x0, 0x4200, 0x20) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(r3, 0xffffffffffffffff) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) faccessat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) openat(0xffffffffffffffff, 0x0, 0x1a340, 0x100) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r4 = fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(r4, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r5, 0x0, 0x100000001) [ 1495.321886] blktrace: Concurrent blktraces are not allowed on sg0 13:26:02 executing program 2: getxattr(0x0, 0x0, &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:26:02 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x19a, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:26:02 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0xfffffffb, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)=""/250, 0xfa}, {&(0x7f00000014c0)=""/186, 0xba}, {&(0x7f0000001580)=""/175, 0xaf}], 0x3, 0x10001, 0x2) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x1010, r0, 0x10000000) io_setup(0x5, &(0x7f0000000700)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fd/3\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1495.333537] blktrace: Concurrent blktraces are not allowed on sg0 [ 1495.385926] program syz-executor.0 is using a deprecated SCSI ioctl, please convert it to SG_IO 13:26:02 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x19a, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1495.421445] Process accounting paused [ 1495.446490] tmpfs: Bad value for 'mpol' 13:26:02 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x5460, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) [ 1495.506722] blktrace: Concurrent blktraces are not allowed on sg0 [ 1495.519927] blktrace: Concurrent blktraces are not allowed on sg0 13:26:03 executing program 0: r0 = shmget$private(0x0, 0x4000, 0x12, &(0x7f0000ffa000/0x4000)=nil) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) mlock(&(0x7f0000ffb000/0x1000)=nil, 0x1000) madvise(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x9) 13:26:03 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x40049409, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:26:03 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x19d, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:26:03 executing program 2: getxattr(0x0, 0x0, &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:26:03 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0xfffffffb, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)=""/250, 0xfa}, {&(0x7f00000014c0)=""/186, 0xba}, {&(0x7f0000001580)=""/175, 0xaf}], 0x3, 0x10001, 0x2) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x1010, r0, 0x10000000) io_setup(0x5, &(0x7f0000000700)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fd/3\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1495.729971] blktrace: Concurrent blktraces are not allowed on sg0 [ 1495.762504] blktrace: Concurrent blktraces are not allowed on sg0 13:26:03 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 1495.866803] tmpfs: Bad value for 'mpol' 13:26:20 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x40086602, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:26:20 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x19d, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:26:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000019c0)={0x24, 0x1a, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x8, 0x19, 0x0, 0x0, @u32}]}, 0x24}}, 0x0) getpeername(r0, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f00000000c0)=0x80) r1 = epoll_create(0x3) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000000)={0x5, 0x100000001, 0x8}) 13:26:20 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:26:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x27a, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f00000016c0)={0xb94d200, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600), {0x14}, &(0x7f0000000640)=""/18, 0x12, &(0x7f0000000680)=""/4096, &(0x7f0000001680)=[0x0, r0, r0, 0x0, r0, 0x0, 0x0], 0x7}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x40, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1f, 0x2, 0x80, 0x9, 0x0, 0x8c, 0x44021, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8000, 0x1, @perf_bp={&(0x7f0000000100), 0x8}, 0x6144, 0x0, 0x9, 0x7, 0x1, 0x29500000, 0x69, 0x0, 0x2, 0x0, 0xffff}, r0, 0xe, r1, 0x8) syz_emit_ethernet(0x66, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c200000000000000000086dd6096153f00305600fc0200000000000000000000ff0200000000000000000000000000010200907800000000600009e6000000000000ac"], 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f0000000040), 0x4) sendmmsg$inet6(r3, &(0x7f0000001780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0}}], 0x2, 0x0) 13:26:20 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0xfffffffb, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)=""/250, 0xfa}, {&(0x7f00000014c0)=""/186, 0xba}, {&(0x7f0000001580)=""/175, 0xaf}], 0x3, 0x10001, 0x2) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x1010, r0, 0x10000000) io_setup(0x5, &(0x7f0000000700)) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:26:20 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:26:20 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x1, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x48) close(r0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x8, 0x7f, 0x0, 0xb2}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffff8001) ppoll(&(0x7f00000001c0)=[{0xffffffffffffffff, 0x9530}, {}, {0xffffffffffffffff, 0x100}, {}], 0x4, &(0x7f0000000240)={0x0, r1+60000000}, &(0x7f0000000280)={[0x4]}, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r3 = syz_mount_image$nfs4(&(0x7f00000002c0), &(0x7f0000000300)='./file1\x00', 0x20, 0x2, &(0x7f0000000440)=[{&(0x7f0000000340)="63dad119caa3d29f924cb1762579d08554374a27039aa39a7be05fe614044446aed6dcd297e778c206d230a590f3daff1f42230b173d1dcef4443a80c92b375cde07c23d8b5ddb02f29da3fe06ccf735c41df5d22d861d4fd52c1969bc2865ff7886dd6e803a2a953dbf4d0eadcb84ca99683fccb57cf7d02c81818f3369f954f39842bf630d7f10e89baa19", 0x8c}, {&(0x7f0000000400)="688d620e1b7295622199a8775f25746bb14354473f9bd018431acc802eaf771078edfd", 0x23, 0x2}], 0x1080, &(0x7f0000000480)={[{';-\'\xaa%'}, {':@/){@!$&^'}, {'.+'}], [{@audit}, {@smackfsroot={'smackfsroot', 0x3d, '.{,)%\xea,\x95'}}, {@dont_measure}]}) r4 = openat(r3, &(0x7f0000000080)='./file1\x00', 0x202a00, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r4, r5, 0x0, 0x20d315) openat(r5, &(0x7f0000000140)='./file0\x00', 0x40000, 0x11) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r6, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r6, r2, 0x0, 0x9bbb) creat(&(0x7f0000000040)='./file0\x00', 0x0) 13:26:20 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a0802000001000001054649", 0x19d, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1513.111144] blktrace: Concurrent blktraces are not allowed on sg0 [ 1513.127929] blktrace: Concurrent blktraces are not allowed on sg0 13:26:20 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x19f, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:26:20 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x19f, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:26:20 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r1, r2, 0x0, 0x20d315) sendfile(r2, r0, &(0x7f0000000080)=0x200, 0x3a) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x200800, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 13:26:20 executing program 0: rename(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x17, 0x1, {0x7, './file1'}}, 0x10) r0 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$getflags(r0, 0x40a) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in6=@mcast1, 0x4e23, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x688}}, {{@in6=@private1, 0x0, 0x6c}}}, 0xe8) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r1, r2, 0x0, 0x20d315) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r3, r4, 0x0, 0x20d315) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e24, @rand_addr=0x64010100}, 0x10) ftruncate(0xffffffffffffffff, 0x1000003) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) unshare(0x48020200) 13:26:20 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x40087602, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) [ 1513.390971] blktrace: Concurrent blktraces are not allowed on sg0 [ 1513.400111] blktrace: Concurrent blktraces are not allowed on sg0 13:26:35 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18ee5e3e85188386, @perf_config_ext={0x6, 0x76}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000240)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000640)={0x0}, 0x1, 0x0, 0x0, 0x4890}, 0x4800) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0xe4, 0x0, 0x18, 0x0, 0x0, 0x16000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000001c0), 0x2}, 0x8, 0x8, 0x0, 0x1, 0x5, 0x15d, 0xffff, 0x0, 0x101, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000000)={0x1}) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) unshare(0x48020200) 13:26:35 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 1528.614390] blktrace: Concurrent blktraces are not allowed on sg0 13:26:36 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:26:36 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x19f, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:26:36 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0xfffffffb, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)=""/250, 0xfa}, {&(0x7f00000014c0)=""/186, 0xba}, {&(0x7f0000001580)=""/175, 0xaf}], 0x3, 0x10001, 0x2) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x1010, r0, 0x10000000) io_setup(0x5, &(0x7f0000000700)) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:26:36 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x4020940d, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:26:36 executing program 4: pipe2(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x409becb7bde85c2, 0x1, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB="011700000100041800000000", @ANYRES32, @ANYBLOB="ff0f0000f6759a34000000002e2f6669af626b12ee5984e5c2bffbd0e8c7eeffb3500c74a300109db264d6f1c567a24d58fb90ad4520b3d39f4730e44f413e81d42f1d25d1be3285e08a474239340ff73ba6e4a45c46750e49a57c11ee3bd0"]) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x81, @empty, 0x4}, 0x1c) syz_io_uring_setup(0x6c4d, &(0x7f00000060c0)={0x0, 0xc3f8, 0x10}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000006140), &(0x7f0000006180)) syz_io_uring_setup(0x2000283e, &(0x7f00000000c0)={0x0, 0xcc43, 0x20, 0x0, 0x31c}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140), &(0x7f0000000480)) lsetxattr$security_evm(&(0x7f0000000240)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0xa4f9d4368cd54265) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r1, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x0, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0xe) r2 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r2, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x0, 0x0, 0x0) fcntl$addseals(r2, 0x409, 0xe) r3 = syz_open_dev$vcsa(&(0x7f0000000280), 0x0, 0x10440) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000500)={{0x1, 0x1, 0x18, r1, @in_args={0x1}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f0000000640)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="07cad83d59e63634dfe9f65aea46fd2ce3fdd700000000002e2f66696c653020b41dfd84d84d70f8e58613fd4a2eb036558d1e467055f734ad9c736ee5b99c567b1fd60946e7df944ad8c1b3c429001e5296e5e4145b3fe789dd3cbe62f6236e3e9501ef8b45baf2de7afcf63e29018c24f7e3031b7bcff18b979d24cfd1f05617aa68f86a310569db693d82e5f253e7f3246f9468f99bbf771daadd310b10c2ed806a3c914396ace43f3476cb42a4f083d1d3cfa51c05d0d84843ca8ebec5acac52cc0074ed2e225143"]) splice(r1, &(0x7f00000002c0)=0x6, r2, &(0x7f0000000300)=0xffffffff, 0xf7, 0x8) [ 1528.617347] ALSA: seq fatal error: cannot create timer (-22) 13:26:36 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(&(0x7f0000000100)='./file1\x00', &(0x7f00000001c0)=""/37, 0x25) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) mknod(&(0x7f0000000340)='./file0\x00', 0x800, 0xb8d) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000200), 0xa800, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r2, r3, 0x0, 0x20d315) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000380)={0x0, r2, 0x3, 0x80, 0xfffffffffffffff8, 0x9}) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x220000, 0x1a2) accept$unix(r1, &(0x7f0000000240)=@abs, &(0x7f0000000300)=0x6e) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) dup(r4) ioctl$AUTOFS_IOC_READY(r4, 0x9360, 0x2d0d) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x100000001) [ 1528.629867] blktrace: Concurrent blktraces are not allowed on sg0 [ 1528.685579] Process accounting resumed 13:26:36 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x80086601, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:26:36 executing program 4: r0 = open_tree(0xffffffffffffffff, 0x0, 0x80980) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x8, 0x0, 0x4, 0x5, "000000200e00000000120000004bcfefffffff", 0x0, 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x20, 0x0, 0x1cf}) r2 = socket$inet(0x2, 0xa, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(r1, 0x9) r3 = dup(r0) getsockopt$sock_buf(r3, 0x1, 0x1c, &(0x7f0000000240)=""/253, &(0x7f0000000040)=0xfd) dup3(r2, r1, 0x0) [ 1528.723015] blktrace: Concurrent blktraces are not allowed on sg0 13:26:36 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:26:36 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x80087601, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) [ 1528.780292] ALSA: seq fatal error: cannot create timer (-22) [ 1528.853731] blktrace: Concurrent blktraces are not allowed on sg0 13:26:36 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18ee5e3e85188386, @perf_config_ext={0x6, 0x76}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000240)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000640)={0x0}, 0x1, 0x0, 0x0, 0x4890}, 0x4800) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0xe4, 0x0, 0x18, 0x0, 0x0, 0x16000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000001c0), 0x2}, 0x8, 0x8, 0x0, 0x1, 0x5, 0x15d, 0xffff, 0x0, 0x101, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000000)={0x1}) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) unshare(0x48020200) [ 1528.878603] blktrace: Concurrent blktraces are not allowed on sg0 [ 1528.904515] ALSA: seq fatal error: cannot create timer (-22) 13:26:36 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:26:36 executing program 4: r0 = open_tree(0xffffffffffffffff, 0x0, 0x80980) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x8, 0x0, 0x4, 0x5, "000000200e00000000120000004bcfefffffff", 0x0, 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x20, 0x0, 0x1cf}) r2 = socket$inet(0x2, 0xa, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(r1, 0x9) r3 = dup(r0) getsockopt$sock_buf(r3, 0x1, 0x1c, &(0x7f0000000240)=""/253, &(0x7f0000000040)=0xfd) dup3(r2, r1, 0x0) 13:26:36 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0xc0045878, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:26:36 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:26:36 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:26:36 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0xfffffffb, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)=""/250, 0xfa}, {&(0x7f00000014c0)=""/186, 0xba}, {&(0x7f0000001580)=""/175, 0xaf}], 0x3, 0x10001, 0x2) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x1010, r0, 0x10000000) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1529.047724] FAT-fs (loop7): bogus number of reserved sectors [ 1529.048489] FAT-fs (loop7): Can't find a valid FAT filesystem [ 1529.063694] blktrace: Concurrent blktraces are not allowed on sg0 [ 1529.068498] blktrace: Concurrent blktraces are not allowed on sg0 13:26:51 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:26:51 executing program 4: stat(0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, 0x0, 0x22902, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x5c, 0x1d, 0xc21, 0x0, 0x25dfdbff, {0x4, 0x0, 0x2}, [@nested={0x45, 0x11, 0x0, 0x1, [@generic="1aa42477b8f0a51e9d30b50aa5199e04f2a93c4011fe4c570cb23489cf7dda9592cd3b9e9826d2f05a7a9c785b5c6ab5a12d981c236ad40251696ca226e00eebb7"]}]}, 0x5c}}, 0x0) 13:26:51 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:26:51 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/3, 0x3, 0x20) r1 = dup2(r0, 0xffffffffffffffff) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/3, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x4, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x65b, 0x0, 0x2, 0x8, 0x0, 0x0, 0x5, 0x0, 0xe2}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x3) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f00000016c0)={0xb94d200, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600), {0x14}, &(0x7f0000000640)=""/18, 0x12, &(0x7f0000000680)=""/4096, &(0x7f0000001680)=[0x0, r3, r3, 0x0, r3, 0x0, 0x0], 0x7}, 0x58) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)={0x28, 0x66, 0xc21, 0x10000, 0x0, {0x3f}, [@typed={0xc, 0x15, 0x0, 0x0, @u64=0x9}, @typed={0x8, 0x0, 0x0, 0x0, @pid=r3}]}, 0x28}}, 0x20008881) ioctl$BTRFS_IOC_SUBVOL_CREATE(r1, 0x5000940e, &(0x7f0000001e00)={{r2}, "078ca303e51a6a795fa3a853fe7ca3206f5e925ff530a272196663163bde47c7dbe52fb5742292e6760cbda612672a554d2c1d6c26ffbe9099f05d2d4c17c89ff65b99c726c6e4036e64ab0b0c7c18f04298767604b690292282bd5036d8f2365affe93a0510924268b7414f14aa044589bcb1ea3da5a403b91931c44993f33efd02872ec4b3ef2ad4502579ad94ac399ba857db53ff7d0d90a70c69cf038a4a0a58e5874bdc7fe0fd3c064d0f4d8e811d9ee3ac710b2e5b8f21e4bd449c2a74b949976bca159bad8e527715aab759b44e2a54aaf465b7b4d422c4254c524e5da4c278f6e5a5051d9e1f9756f2dbe965643d0649df4102d9ba9e1814b98da15bc9669ccf0c56e82a72c93f1fe84512f32cc5e03bc2a17be7cfab07793d811e6485d67b668762bb21dbb468dcc5a752e6a4a396fdbedbf29c0ab3a1e7f247788b7f45c7520191eac23dd6b9b2990c5165ee6b850264163b384ed79f1c11854720082fd54c3f568f7446ab546141ed3e63779ef5ee60de9b64b622ae1b0e50d4cb89a55625825cbabbc98219e13abb1f65ebadff99b63c5a22f2c53d36ce09a2c310f13e235bc1fcbeee0f07e1b5fb8a68a0a2b8d2de5d3c20323d42fa62a701413dddd229d5243322e9d5cbb1e5a0f914d9b669a634470bad187920a01e17a636ce5cb392d84910049a7ebc354bec8d9b83d86aa0bd23914adef000324f8c5d4c5e51a8220924aae1c488aeed57c94f7b2af9f3c7a973185c0dd8826a74d85a8e4695cf31fdf5dfae3d75f843328215935449492830bb42e9675fe28ea54f7ce368e7be408b8bc34f51134ced9dedca9f6941a722f760ef78baff9c81ce0c1959f1916f6a1dcf909bdbf72a9e99b5a6b67f9a8fca7ce2c8a8dbaac28f3f88b41948a7546911f2c4127074c9c18338a522f7a7117d2440ec53ac26af66f9035b16c1847525609a40c9879ed149b2e7fae45c876842d9eceb1f40ab5f3dbaa832e56789dcbde270a0a4d8748d57a566ec8afdefc80fcf7927ec3b1a9a1445d8def71760e52d592471e0fe3df3ce34cb5042df253706925556a0aca7e88c39d53797f46960b67d3d038e86e53e0f7fdd0e7aeb41fe1a2d38803902a846f289813d09c5c164bedc4421a6ae85ed2d22cd8da8b99b40c397b5a9b3d0019a449581e0b955cd402ece35d9e008ffb5d56a8fb4e0206f319d828e647eee6a28067a3e4893050611b479e08b6142fa1f85c7e100461fd1cd320b98b76046e3716820b71a2c8dfa01162d3703a35c43868736926f58bddfa51245048fcfc5115bbb08fbc42567bff9130e0f032a2965d849724a6849814687da3b9cd28fa027bae3cffa07031331d3a898696032cb940da02bf80baa835c783c9b7dd456c7878f9ba77a32763054144a6c8935f06f55fcd4d0643ec9a416f99b6ab34764a63b73c1d8d68f61331d4993c88e1344afb3889e88c43dd73aac3b3e13b95d36ccc8dfa1b7801f4b58bd6ad33e605a6a0fce5a2c93839516c02e679905e8f23920cf250b44c8045b046c2d180da7ba43318d37e531231c6492c06dfe52607fb8d109310562c7dc1232c9913bc22c6f29069c577fcfcaba728cf8cdba28913c9939c565935d217047dbef02cb27eb47f4d53e26a3eb354a6f75d62332d270206b023fd22cd7b375d7407b20319d0854e1e312fef9a9d39a2e670fe1f073fd87bd2ac6e7a7568ba459dbf1b1a4a9cc37ad87cbc5539876b0869ea2fc508a61113cdd8d244c29df125451d7c6892f608f45ca914812d34d9c291d42d2398b59dce1171ebcf5d72c7aff4e1a3b5a36aa7cce02778526a8d2bbebe89c60237fb3ae54f00ff14246baa9a461166a1dafb45e36aa591f8508a30b1d3b20cd3a4d664d9684aae39f04717aac76a55bc0be77c9f176149d59d7950ae4813c72bf6e634867ea1a1a70bb69bb11cdf276ea3b55ef059d1019b0e27042c75430e3bf74426672d24d8fe0010cd37f34f1b7a9ff4938eb1e27f28761eaca29e21cb29980d09e18f67083bc24ccefa03cb505f267ac50296ab8153cbc8b9496467218a2bf0286424b0b187837f2679f3478c35ad0fe5fcab74a4bae8956d2c42aa823bd3d612c7d90f833e60ab2a23d819fb92a878e056e7f63155bdf9938cf33f6e90b8ebe2f5556264c510d987203e91755e0488e830647f0682e404076fc46d5f477f6093a1df6bd5a5520b0d5ce1dbc45f98ce0e679e8fdb01c3b51642c00d953069b840a26bd39f4c7ff3a193c724f6b39c38357bcec807fb404433a1fc27041c67406dc6f2dead6753066f73e02cbcf3a4e81a8f81b73b8a235f841f5bd09318aa3998cbbce7db1d03102bc9a85bf042120cfac76402c7a2264962293ae9b8bbc91f18259ba4333364f6646ce951034bf413a14d0a52e56b5df41308161aab45752e76422329bbd7704989ec75fd8aedbcf2f2b8ddea28be742f264f4980133ecec0d98988f1cdda9d0f99daeb32d734ba8845601bcb79b1f1c55221814a4d18c9aa8f907ad5190ec0e5470794b53288714e29f1267551ff624a8c6da13cb08c9ded04caecc2e98bebae49951eef87a9e432db7c1e8bb11f3cbd13773711a0ccf5a9e1cc3060d4ad9fc4da6b604c76382662bc9d5b7054cc8149c64377e4488f692a0646edba87657e07e438839feca7770f1d5dfe7b2117e48eb51dfdb62ee4feefdd598070cb6fe5dde9ca20c2727e03e02cf3614ee02b9733d1ff7bb52f952886e65312123cb7f93de439938095c49345be3f96d589d0acc5a4ac70a08d0a32389a2ffeac09f111e9a52fe74d895efac41ed01324b4ca0e8475ff2f74298221d35a1fddb6d838cf4167198e54faa323524f8b6c081a43f949a2380ca66c7f41b469c4d713f73c0eb0bf55ece19963938ebd264c0c28e4c77a2ebb7eb64f6e7899b24eb1e80ce57e88b48fa52d726d8c83d9b04f817dd21158ca8c4fa11b5b8ff6fab48b91ca21ca66e0eb8132a44945e5f0c9b261b682972341dd9adedd2f141958120fc04575a60879f4e4fd424d18516a6ac5e44d6b697577b895e2e76c180aa0ecb9c4207312f1dba6f9b205b7b2fd477be96b729f150c20b9d7b5f2ec36449288c7009b502f48d799247268cbdd5df2a51b2a0d7cfc2cdfe06097acfd14f10ca10e343cdcd70c3994c92da431e25cb82bd72a263d4095f901007a562398838fdbb7fe41b7da2a4e1e4b2fc64b9f1caace22a5590e72216aa1f34700c3c24b77db2faf3b8f4a5da69b890ff25092f2f17427bc7f453021c8d57098270e9219d0e04007e3992e415694a90993fc517b529038ea96811494d7fe0fb85c312e560d62a21d6c0ae1ab33b5cf26e5c5d3c567167ff553cbe71c887235ce5b7de3c5767baedb708767ee3ae682dd575e7d3e1a8e9761cfa7b032761b319579d02a2d1c472daf603919a30a86981d8ccbaef386cf787ae35d30366912b89a8f0b61a4c977dcbe091253ff6780f64dfe294ee2e1fdf92bcd2c99e59c5f8d6d01d1f5d3a4d06fa28f7b84e05563804d4f140c224efb2c3f4c215b9c2a374af8129311cfa6389c928a0c0b2a6029c382e86a13b576f12aa819e8fbbc29c9c37ab4eec2756fccd06f6d423c666afe32990ba409707b0eb0a97fe854ef0a273c160a24992d12e01031ad913ee551a022f9e721d2a0e9f40504c1e22d94408618d28bc5dfbb9b3047111355c28bbe56530a5b8f837dd1696acc51554483e3305c2b96278a4d9a3e3a6731527c96727563cf31ff0ca0ebc287c7b037f19699b9acd23bdfe82f8ccc6694473e2074b21b48a3f2f663f3dd5bd8ab818181d43f5a37b3790cc2a9a80251329cadb42121ea556cd3c4e1626e7be99340a035a5dd025fd37d0242a704e1ce3e91733503ea714ccfba1a23603e6ac4ad0de8f0fca8fb4667b9672ebd1ef8cf4cb26f13373323f950afc580593b9fa40f21af082bd437efc66f2ebeb63e4df1b5f83931c3454e3c3c46924cb52a8ae6edec697f1c46cb95df9610a516218942ed8656e48e83d344d047fc714148ea1a366eee2727e6521a892d7fa5627ca1e256ccac1c7bb29ba5ef2e1ad27a79bdd5a01f95872d2db1ad63ce2dcb0b590118965b9bb2fb2f7c304e8c291a8bb1c1eaa9bc6184357be30d8acdc408dd813bca6b60ee89583b42c330ce8d4b3abfb5a6fd156bd2f872c1c394d5215c61668f6934a6733cc599fe711d895cd229b027f7a4fe73ba3c9357a8a0dac78a67de1d575a1ab89e708c6fdfb721ea305d259c438dd651a5ab2f1c06b6afd4473fb75c1a34d6279c0b834108c333585aa57c8763a2a9e2957c59ebbe786c116a49c1185dad2185ae7facda85ddefae0190b42769cee2921ece22c2bb3e1e3c65e1958a3d76596149c47fc718e4f3a242e4014db88f1ee1e31ec5decb577359bc2789e57ca4426a089751b9e502e331252c53a74a0c4fb858463586066acdf09042375a1d32f25bfbe22b504ab917d79e460a09ba888ea08abd125b824a7315562d7bd1f3884aeb56d5d59edce4bca064f2c196408c5d8e72c9de54154f069e38d67b06c6ca52d7e7815ed5cc2f14589f3ddac14bba99fb071ff5e61a1735039a7c57ea9f29077b1a3ca1f716daafe768763a65d507921c5f283a29320b870a19bd299c209acc06d657c667b009bd03d8149b80079bb6680bdb55bb0471dff5f202b7cdca00405e03b766af48923d5d73d8c5aabb9e5d572b7b720cae02d03255067272660b4227a5f93f6f92655831ac944c6a373b6f5a5df2bfb63ec24c125f51ecd09a6aee32292632bf3f7b2d03b2f7c72df4ae534a95ecdf3170442191f7536a556d3235718b9d9471c24cfd1ab5badd2e37f99c616842adc12fd0d9bcedcfcf5cf730ef633f0e80673bda36f466af178608626662134d37f017fa545202e194b3ed0d3869fa355584334369d918b29440b6d66fda050532fc399a4cef53e83ee36797565cf6268c363496405f8f5c4e42944b9a8bb0862fbf81e4aea8b4e9b1f4c145e61b649a7afd69f098d244d962d08945f69eff59198a0c952b19753e93f4c4be0ef32d95d9d6d88dceb22fa22aaf72b8740a9aa70f1f502359c7c551e61d04c656ebd7b7db41c3cffd109f7a92c5f04c6ce7d2c515462642499f7153f0569f1d530b55e133c889622aa6c7dbe95073345d83be7301e1279b8c975d840014db1623f1ca32b7551f6ff23322ab8ad4244fd4543fae604fbfd08952fc4b350aa4916ae635d819c6b613731ca0ff1d77dc1612d281f4ed4bbeaf23f31bf094842a4acc7f0964f71d030b3b897e6688deb02cc580b03fcb6bef01340a1b500ca183a9226bbc30558db55161eb256df1e97be647d10a08720e70a7bba68d0b2e31cadf26f1618624fc943e85039b868ff2811ed468e542ee904c609ed1b8bfd039aaec1dee204e2ee5b920edca47400fdfbf6ea90603237bf3ee1d91692e779cb9d87a338e474c9e25f9f00ac24dffb7cb2496e2a61401e11d5d4ada06cdc906c350bc43434f992cc54fd35621b41cd3f7f255755ee6bbac384a69581ca97f99a350c392614b15225a7364e90070132ebbb3287d5f7d3c4f6567ef925749a51df0ef66777a5d6f1e02a5180225f738a57c4613ebc8e8f59e4898f235d27e9dcfa7e2ca483bf8b4a41cc6eba2e6eae31e89327d95526bd8a67761349d22ecd8bbe610f5ae412e44b18db8ec2be9b4f88e44ab201a9aae69f1756e8f0e5fbae4caf92a5b5976ef9a6fbdd8b79c1255948136a431413a3e99864cf6f89087f5204a7cf"}) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0xf7, &(0x7f0000000000)) openat$sr(0xffffffffffffff9c, 0x0, 0xe8b02, 0x0) [ 1544.172100] isofs_fill_super: get root inode failed 13:26:51 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18ee5e3e85188386, @perf_config_ext={0x6, 0x76}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000240)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000640)={0x0}, 0x1, 0x0, 0x0, 0x4890}, 0x4800) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0xe4, 0x0, 0x18, 0x0, 0x0, 0x16000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000001c0), 0x2}, 0x8, 0x8, 0x0, 0x1, 0x5, 0x15d, 0xffff, 0x0, 0x101, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000000)={0x1}) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) unshare(0x48020200) 13:26:51 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:26:51 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0xfffffffb, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)=""/250, 0xfa}, {&(0x7f00000014c0)=""/186, 0xba}, {&(0x7f0000001580)=""/175, 0xaf}], 0x3, 0x10001, 0x2) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:26:51 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0xc0045878, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) [ 1544.200265] ALSA: seq fatal error: cannot create timer (-22) [ 1544.213926] blktrace: Concurrent blktraces are not allowed on sg0 [ 1544.215259] blktrace: Concurrent blktraces are not allowed on sg0 [ 1544.231937] FAT-fs (loop7): bogus number of reserved sectors [ 1544.232633] FAT-fs (loop7): Can't find a valid FAT filesystem 13:26:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r3, r4, 0x0, 0x20d315) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$ETHTOOL_MSG_STRSET_GET(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="ac020000", @ANYRES16=r5, @ANYBLOB="00022abd7000fddbdf25010000000c00018008000300030000000400030020000180080003000300000014000200626f6e645f736c6176655f31000000000c000180080003000000000034000180140002007663616e30000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020076657468305f746f5f7465616d000000d80002803c0001800800010003000000080001000301000008000100070000000800010006000000000100000008000100070000001c0001800800010006000000080001000500000008000100000000001c00018008000100080000000800010006000000080001ff01000000340001800800010007000000080001000800000008000100030000000800010008000000080001000000000008000100020000102c000180080001000700000008000100050000000800010007000000080001000600000008000100010000004c000280240001800800010005000000080001000700000008000100040000000800010006000000240001800800010005000000080001000000000008000100050000000800010006000000040102803c00018008000100010000000800010002000000080001000500000008000100050000000800010003000000080001000600000008000100020000000c000180080001000400000079c62407000000080001000800000008000100000000001c000180080001000400000008000100050000000800010000000000240001800800000500000008000100060000000800010007000000240001800800010002000000080001000100000008000100020000000800010002000000040001802c000180080001000100000008000100020000000800010005000000080001000400000008000100144ceaa700000000000000"], 0x2ac}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x28, r1, 0x3ddc8cfb493e3995, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004081}, 0x0) 13:26:51 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:26:51 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0xc0189436, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:26:51 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0xfffffffb, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)=""/250, 0xfa}, {&(0x7f00000014c0)=""/186, 0xba}, {&(0x7f0000001580)=""/175, 0xaf}], 0x3, 0x10001, 0x2) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1544.354847] blktrace: Concurrent blktraces are not allowed on sg0 [ 1544.360371] blktrace: Concurrent blktraces are not allowed on sg0 [ 1544.368730] isofs_fill_super: bread failed, dev=loop6, iso_blknum=48, block=96 13:26:51 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:26:51 executing program 0: r0 = creat(&(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@ceph_nfs_confh={0x10, 0xfe, {0x9}}, 0xc0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth1_to_hsr\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'macsec0\x00'}) 13:26:51 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0xc020660b, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:26:51 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:26:51 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18ee5e3e85188386, @perf_config_ext={0x6, 0x76}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000240)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000640)={0x0}, 0x1, 0x0, 0x0, 0x4890}, 0x4800) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0xe4, 0x0, 0x18, 0x0, 0x0, 0x16000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000001c0), 0x2}, 0x8, 0x8, 0x0, 0x1, 0x5, 0x15d, 0xffff, 0x0, 0x101, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000000)={0x1}) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) unshare(0x48020200) [ 1544.544025] blktrace: Concurrent blktraces are not allowed on sg0 13:26:51 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000140)={@desc={0x1, 0x0, @desc3}}) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x2000, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'xfrm0\x00'}) ftruncate(r0, 0xfffffffffffffe01) [ 1544.560324] blktrace: Concurrent blktraces are not allowed on sg0 [ 1544.604914] ALSA: seq fatal error: cannot create timer (-22) 13:27:07 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0xfffffffb, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) preadv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)=""/250, 0xfa}, {&(0x7f00000014c0)=""/186, 0xba}, {&(0x7f0000001580)=""/175, 0xaf}], 0x3, 0x10001, 0x2) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:27:07 executing program 0: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = openat$incfs(r0, 0x0, 0x0, 0x20) r3 = openat(r2, &(0x7f0000000300)='./file0\x00', 0x12000, 0x8) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) sendmsg$NL80211_CMD_RELOAD_REGDB(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x14, r4, 0x200, 0x70bd26, 0x25dfdbff, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x40c0) bind$bt_l2cap(r1, &(0x7f0000000500)={0x1f, 0x0, @none, 0x6}, 0xe) r6 = inotify_init1(0x0) fcntl$dupfd(r6, 0x0, r6) openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x761800, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$bt_l2cap(r3, &(0x7f0000000340)={0x1f, 0x7, @none, 0x4}, 0xe) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 13:27:07 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x10102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x6, &(0x7f0000000040)={0x0}) clock_settime(0x0, &(0x7f0000000100)={r1}) ftruncate(0xffffffffffffffff, 0x1000003) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)={0x0, 0xffffff7f, 0x9}) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r0, 0x8008f512, &(0x7f0000000180)) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfdef) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) acct(&(0x7f0000000040)='./file0\x00') r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW2(r3, 0x402c542c, 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0xc6, 0x4, 0x4, 0x2, 0x3e, 0xffffffff, 0x1d6, 0x40, 0x1ed, 0x1, 0x7, 0x38, 0x1, 0x7f, 0x8000, 0x7}, [{0x60000000, 0x8001, 0x9, 0x8, 0x6, 0xde, 0x1, 0x53c}, {0x6, 0xfe000000, 0x3, 0x2, 0x1, 0x7, 0x100, 0x6}], "46e7b9ba35423c7023cb64a853f2e47e29f42481ae7647a411f69768292d85d39a69b30caf8d72dbdbbfd3a42d43cbeb534fd93d93f71c", ['\x00', '\x00']}, 0x2e7) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000240)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) io_setup(0x5, &(0x7f0000000080)=0x0) io_submit(r5, 0x1, &(0x7f00000000c0)=[&(0x7f0000000200)={0x0, 0x0, 0x5, 0x1, 0x0, r4, &(0x7f0000000140)="ee", 0x35, 0x10000}]) 13:27:07 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0xc0481273, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:27:07 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:27:07 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x8010, &(0x7f0000000280)=ANY=[]) setxattr$security_selinux(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340), &(0x7f0000000380)='system_u:object_r:autofs_device_t:s0\x00', 0x25, 0x1) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) ftruncate(r1, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x10a) write(r3, &(0x7f0000000240)="01", 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0xff, 0x0, 0x5e, 0x20c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000740), 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x10) fcntl$dupfd(r0, 0x0, r1) sendfile(r1, r2, 0x0, 0x20d315) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40202, 0x0) fsetxattr$security_evm(r4, &(0x7f0000000180), &(0x7f00000001c0)=@md5={0x1, "14a8e82f6acb5c1fdec6fd2a1d7050a2"}, 0x11, 0x6) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000002c0)) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/module/keyboard', 0x72900, 0x0) clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), &(0x7f0000000400)=0x0, &(0x7f0000000440), {0x2e}, &(0x7f0000000480)=""/248, 0xf8, &(0x7f0000000580)=""/253, &(0x7f0000000680)=[0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x7, {r3}}, 0x58) fcntl$setown(r5, 0x8, r6) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 13:27:07 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:27:07 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:27:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.min\x00', 0x2, 0x0) close(r2) [ 1559.799257] blktrace: Concurrent blktraces are not allowed on sg0 [ 1559.807781] isofs_fill_super: bread failed, dev=loop6, iso_blknum=48, block=96 [ 1559.837074] blktrace: Concurrent blktraces are not allowed on sg0 13:27:07 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1559.853170] FAT-fs (loop7): bogus number of reserved sectors [ 1559.854491] FAT-fs (loop7): Can't find a valid FAT filesystem [ 1559.908154] Process accounting paused [ 1559.922519] audit: type=1400 audit(1686922027.330:31): avc: denied { relabelto } for pid=10817 comm="syz-executor.4" name="file0" dev="sda" ino=16046 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:autofs_device_t:s0 tclass=dir permissive=1 13:27:07 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x2) readv(0xffffffffffffffff, 0x0, 0x0) [ 1559.979325] blktrace: Concurrent blktraces are not allowed on sg0 [ 1559.989728] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:27:07 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0xfffffffb, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1560.071548] isofs_fill_super: bread failed, dev=loop6, iso_blknum=48, block=96 13:27:07 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x3) readv(0xffffffffffffffff, 0x0, 0x0) [ 1575.331457] device wlan1 entered promiscuous mode [ 1575.332284] A link change request failed with some changes committed already. Interface wlan1 may have been left with an inconsistent configuration, please check. 13:27:22 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_SEND={0x1a, 0x3, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0, 0x10}, 0x8001) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x7f, 0x8, 0x2a, 0x0, 0x0, 0x6da, 0x1, 0x7, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x1, 0x8}, 0x45810, 0xfd8, 0x6, 0x1, 0x7f0000000, 0x3, 0x9, 0x0, 0x8a, 0x0, 0x5}, 0x0, 0x3, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) fallocate(r0, 0x0, 0x7, 0x6985) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="240000001000010000000000000000000000000005000000ff7f000000000000040014"], 0x24}}, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x48020200) 13:27:22 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:27:22 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488404cabd15439f170e429dd5057d7d5db566fc9e4cab1128bce328ef54be2ac02ea82a613a077c2508b07638c2da855795a8523c7986a4979fc9300627bae481812a27b"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:27:22 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0xfffffffb, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:27:22 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:27:22 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xc) readv(0xffffffffffffffff, 0x0, 0x0) 13:27:22 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) io_setup(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) connect$inet(r2, 0x0, 0x0) r3 = dup3(r1, r0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, 0x0, 0xffffffffffffffff) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000380), 0x10043, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r5, r6, 0x0, 0x20d315) r7 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0x100000001) r9 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) sendfile(r7, r9, 0x0, 0x80000001) io_submit(0x0, 0x8, &(0x7f0000000840)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x40, r3, &(0x7f00000000c0)="d7cbfb92dd2fc46e37b44bf0b6f3b4698e45a21d043a0d8692f2637beeb24672043077792d78a88587c1d2cd8bb72dfc96ac408d8e5734a75e5f3c38dd10deffd25290fc3e3eb634a1074f97f296c1a5d0b5fbeaa7cffdef60", 0x59, 0x264, 0x0, 0x2}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x7f, r1, &(0x7f00000001c0)="d5a04a1017722b27670467a266ef2a7ae4c7abfdade5c3e015839bae88a98f9c8602c3691a19085bbe56888bcd01b0cbd23820870bc1fc444b62ae866894ac8f9dfeb345d64a8df3ecb54fd77b0326f32ea0ec", 0x53, 0x6, 0x0, 0x1, r2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x8, 0xffffffffffffffff, &(0x7f0000000280)="05a21e0ae0beb1470d966922c25fe49c4e42659dec3b55a5740671c44a2cf8d48b30559386a304de5e14b27ebe0df4555b537ef51ea8cbe2e0429b41dd3a1a7bb5b62a324e2fd896316f5d0b185185d979e657d00d5154de0364092efb195f4b17e4aedffb48276a8dcd260a22af3c1c8eef7f07573bb82198201ba1ee606f296c1b370328d91f43c7744fc5a3a7d420a7f9438121bd980be409000ab22924c97b47b7268dd47badc179628696f31cfba075dafae3457147a38e4d43b40bf1850ef102d5729a874808e181199d76b2f9ab1a91fcee9bc38f33db3ae04f34a1b8ca94d0a0e6a4abea758a9e540154ea1641588306", 0xf4, 0x1, 0x0, 0x2, r4}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x2, 0x40, r5, &(0x7f0000000400)="159693b1b4799dac35a5e0a787b6842eba0471cbf9228e9cd17a9f7141330addd92b77b24a9aa81a5b06fc1ac17c18cb92f6faaf9dceed7c7a", 0x39, 0x3, 0x0, 0x1}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x8, 0xffff, r3, &(0x7f0000000480)="4fa6316f799306f576e2f5b52b855ea2b30c6d7aa404805acb", 0x19, 0x57b, 0x0, 0x6, r9}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x5, 0x6, r3, &(0x7f0000000500)="16921943bbbb10f3a0b45047edd33f4822e94ffc35d2edd3fd3bcdd9aa53c6176f27b488df19f2747aac92285f7f1efea221de733a3ebd128f9e6da7e0ac32213ac743a3e80168f4bc01ce2011449f91a135370b54d07795fed8327b8d241657ae9b5b564ec09b3f9dea55250274738aa57016f8bd170b681a07c7a7b66ace4495990569466a3d5846d5c946ed17ca1eca19b318cbb93b5cd79c1f383fc3b7efa86cbbe71796828429aaa6d462c17946db7d12af9fd97f978e63863ef0085c3dd0066ecfc81418b518f727d382c9764781f1ed107038f4e6f2e53a331d54f996a1b305", 0xe3, 0x80000000, 0x0, 0x3, r2}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x7, 0x8, r1, &(0x7f0000000640)="7c523b3fa933f27067dda76926b8b5ce87a3e67131091a986ed03aa7cb44da1e77d7e3d3361ad5e639b4c829f0ab0b4e53db40e4fa1eb6f737f45b43ff575bace2684100b13f59bd3f160b7682fec320b72880c96a4338cb396e1f89dd0910ceefd6daf37bbfb227755eb4f08ee67db9e314a4437f4a98e35d8e2129628ca9271e51f92336675529bf330a0a4b26d42baf29e38f9f44183325d207b5fbc011e13efa3ac09d4913cb7acd91550588de39185c5f14935a24", 0xb7, 0x1000, 0x0, 0x2, r2}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x3, 0x9, r0, &(0x7f0000000740)="04de5219847b1c37f4523ef9d5da89a5abbbaeb26e34780192e54d26fe9727a521e28c09547a22080185e4ffd9d60b4b7d05ad797df233d9ff42c281080c7731acdace8da17faee323f2089732983baddc0608ac870efaa95736b21a4bbf29413ee5b2fb34895129f370da4f5792ca831578500aac2bd246b1f4f771a2b2b93f6d9d27421dc5aae2bb22b5ee4a1a2f48914067d32e9c200edc39011347655dbed322", 0xa2, 0x400, 0x0, 0x2, r2}]) write(0xffffffffffffffff, 0x0, 0x0) 13:27:22 executing program 3: creat(&(0x7f0000000180)='./file1\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f00000002c0)={0x1, 0xcc6, 0x8}) pwrite64(r2, &(0x7f0000000080)="5c03c8b801f098720be1a0939cba80001e54ca1b89e060c72664e4e4345313484f661d367a499955de9b9a638b2c14a88e443a7d3c5b4ce453a108d0f12889b29c2ff887e11579623ebd970cc6c87ccc40ae49e747328a966ea363afa0ce2f71bd86a88209569b46dba8cabf829efefae6a880bdbc6eaf3cf5fc13485b9abe9f57f6918b14d5337ffa0d11168d95d226f8674ef0fc207b8108536eb17a546c761dfe7e21bdc8072b829dad3525454a771ae749b21e4568938d83bbd73990100739007fa12892dc19d0f896b228a979e4753873cdf6", 0xd5, 0x2) syz_io_uring_complete(r1) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r3, 0xc400941d, &(0x7f0000000000)={0x0, 0x1, 0x8946}) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r4, 0x82307202, &(0x7f0000001380)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) read$hidraw(r3, &(0x7f0000000340)=""/4096, 0x1000) lseek(r3, 0x0, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x401}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 13:27:22 executing program 4: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) [ 1575.438150] FAT-fs (loop7): bogus number of reserved sectors [ 1575.439497] FAT-fs (loop7): Can't find a valid FAT filesystem 13:27:22 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0xfffffffb, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1575.510338] isofs_fill_super: bread failed, dev=loop6, iso_blknum=48, block=96 13:27:23 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x3e) readv(0xffffffffffffffff, 0x0, 0x0) 13:27:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(&(0x7f0000000100)='./file1\x00', &(0x7f00000001c0)=""/37, 0x25) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) dup(r0) ioctl$AUTOFS_IOC_READY(r0, 0x9360, 0x2d0d) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 13:27:23 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1575.659523] blktrace: Concurrent blktraces are not allowed on sg0 [ 1575.747404] audit: type=1400 audit(1686922043.156:32): avc: denied { tracepoint } for pid=10897 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 13:27:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0xf0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001d004527004000000000000006"], 0x14}}, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2401, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x4, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="ff000000000000002e2f667afc13acb3"]) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000140)={0x38, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_TX_RATES={0x1c, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x18, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x630]}}]}]}]}, 0x38}}, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(r2, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r4, 0x8, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4000010) r7 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x342, 0x0) write$binfmt_elf64(r7, &(0x7f0000000180)=ANY=[], 0xfdef) ioctl$NS_GET_OWNER_UID(r7, 0xb704, &(0x7f00000003c0)) read(r0, &(0x7f0000000100)=""/153, 0x99) r8 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f00000016c0)={0xb94d200, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600), {0x14}, &(0x7f0000000640)=""/18, 0x12, &(0x7f0000000680)=""/4096, &(0x7f0000001680)=[0x0, r8, r8, 0x0, r8, 0x0, 0x0], 0x7}, 0x58) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x9c, 0x1, 0x40, 0x4, 0x0, 0x7, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_bp={&(0x7f00000002c0), 0xe}, 0x6114, 0x2e6a, 0xfff, 0x7, 0x2, 0x514, 0x9, 0x0, 0x1a69, 0x0, 0xff}, r8, 0xffffffffffffffff, r1, 0x2) 13:27:23 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0xfffffffb, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:27:23 executing program 4: syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x80, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000180)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) sendfile(r0, r2, 0x0, 0x80000001) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfffffffffffffff8) 13:27:23 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 1575.861755] FAT-fs (loop4): Unrecognized mount option "./file0" or missing value [ 1575.871719] udc-core: couldn't find an available UDC or it's busy [ 1575.872585] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 [ 1575.942860] FAT-fs (loop7): bogus number of reserved sectors [ 1575.944159] FAT-fs (loop7): Can't find a valid FAT filesystem [ 1576.691979] FAT-fs (loop4): Unrecognized mount option "./file0" or missing value [ 1576.694360] udc-core: couldn't find an available UDC or it's busy [ 1576.695251] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 13:27:38 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 13:27:38 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600), 0x0, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:27:38 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x300) readv(0xffffffffffffffff, 0x0, 0x0) 13:27:38 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:27:38 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0xfffffffb, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:27:38 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:27:38 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x80001, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x9, 0x0, 0x19000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = creat(0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000002c0)="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", 0x131, 0x10001) renameat2(0xffffffffffffffff, 0x0, r2, 0x0, 0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 13:27:38 executing program 4: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f00000003c0)) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000140)={'#! ', './file0', [{0x20, '#! '}, {}]}, 0x10) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a750000000b5300000056149a2b95c5cef7ffffff", @ANYRES16]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x80000001) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r4, 0x8010661b, &(0x7f0000000200)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r0, 0x0, 0x87ffffff9) [ 1591.343408] FAT-fs (loop7): bogus number of reserved sectors [ 1591.344797] FAT-fs (loop7): Can't find a valid FAT filesystem 13:27:38 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x488c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4089, 0xff9}], 0x1) [ 1591.396747] isofs_fill_super: bread failed, dev=loop6, iso_blknum=48, block=96 13:27:38 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0xfffffffb, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1591.482573] Process accounting resumed 13:27:38 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xc00) readv(0xffffffffffffffff, 0x0, 0x0) 13:27:38 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600), 0x0, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:27:38 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:27:38 executing program 0: write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfdef) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000005e00c5d50000000000000000000002000509008092000000"], 0x1c}}, 0x0) readv(r0, 0x0, 0x0) io_submit(0x0, 0x3601, &(0x7f0000000180)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0xffffffc8}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) syz_io_uring_setup(0x2af8, &(0x7f0000000100)={0x0, 0x3750, 0x8, 0x0, 0xb7}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000001c0)) 13:27:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xd, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) ioctl$EVIOCSKEYCODE_V2(r3, 0x40284504, &(0x7f00000000c0)={0x4, 0x1d, 0x100, 0x7, "b701330ed1990f3ee9981f9d36c1f9480e57d36c363e712f12df5df76a496378"}) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x8000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) pwrite64(r4, &(0x7f0000000140)="0e", 0x1, 0x0) [ 1591.629063] isofs_fill_super: bread failed, dev=loop6, iso_blknum=48, block=96 13:27:39 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000002c00)=[{{&(0x7f0000000140), 0x6e, &(0x7f0000001800)=[{&(0x7f00000001c0)=""/1, 0x1}, {&(0x7f0000000200)=""/166, 0xa6}, {&(0x7f0000002e40)=""/226, 0xe2}, {&(0x7f00000003c0)=""/208, 0xd0}, {&(0x7f00000004c0)=""/45, 0x2d}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/153, 0x99}, {&(0x7f0000001780)=""/81, 0x51}], 0xa, &(0x7f00000018c0)}}, {{&(0x7f0000001940)=@abs, 0x6e, &(0x7f0000002a00)=[{&(0x7f00000019c0)=""/18, 0x12}, {&(0x7f0000001a00)=""/4096, 0x1000}], 0x2}}, {{&(0x7f0000002a40)=@abs, 0x6e, &(0x7f0000002b40)=[{&(0x7f0000002ac0)=""/113, 0x71}], 0x1, &(0x7f0000002b80)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}}], 0x3, 0x40000042, &(0x7f0000002cc0)={0x0, 0x3938700}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x90101, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote, r5}, 0x14) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x4, 0x0, 0x4, 0x1f, 0x0, 0x2a82, 0x5034, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfff, 0x1, @perf_config_ext={0x3f, 0x2}, 0x902, 0x10001, 0x7, 0x0, 0x9, 0x2, 0x40, 0x0, 0x401, 0x0, 0x800}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) setsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000000)={@local, @multicast1, r5}, 0xc) sendmsg$ETHTOOL_MSG_CHANNELS_SET(0xffffffffffffffff, &(0x7f0000002e00)={&(0x7f0000002d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000002dc0)={&(0x7f0000002d40)={0x50, 0x0, 0xa20, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x3ff}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x275d}, @ETHTOOL_A_CHANNELS_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x8001}]}, 0x50}, 0x1, 0x0, 0x0, 0x8010}, 0x4006) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x80, 0x0, 0x2, 0x0, 0x0, 0xc9f, 0x802, 0xa, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000000), 0x7}, 0x1040, 0x1, 0x10000, 0x6, 0xab1f, 0x84a, 0x3f, 0x0, 0x10000, 0x0, 0x3}, 0x0, 0xe, r0, 0x9) dup2(r1, r6) 13:27:55 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0xfffffffb, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:27:55 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600), 0x0, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:27:55 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x80001, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x9, 0x0, 0x19000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = creat(0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000002c0)="003ae42bd34265b44e68d40caa054d168dc1e4872cf365f43392ef6039aa643197f0deb9a13ea4675f6df4173236e5737844083b9cb71e4186532daae5c91fd878ae8c7c37e7ebbe2cac21238c8b3b4a06a5d0f7eceaf815784696050336d33e6b68a117e29bf4cb12704528d8534bd184ea11b6917f91f77dae6b1b3fcb5d10ad054e9f14e4ebbb977a5a9c6a3c28e3d9000681bd6252ddcf6b3a005ed5838d5dd2a467c0b3f3a8966506c804d05e39313e64e9a82f9ca8a36b725c4e47dc11ac0d9b73f97f986a87b8122892bb8489ea4be1e052cd4549999d5ef3531326c0b9edffff7f00000000984004539c562a01353d64cd849fc5f93a1013b173f874699b72fc2eb1a4673a5ccd1eeed55dbee6db9f2480afefd6dc8df65cb349f8eb95daf02b7c765a4675ce2d9ed827a2961b", 0x131, 0x10001) renameat2(0xffffffffffffffff, 0x0, r2, 0x0, 0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 13:27:55 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:27:55 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:27:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x8, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) fallocate(r0, 0x14, 0x100000000, 0x4) 13:27:55 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x40040, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) dup2(r0, r1) 13:27:55 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x3e00) readv(0xffffffffffffffff, 0x0, 0x0) [ 1607.883604] isofs_fill_super: bread failed, dev=loop6, iso_blknum=48, block=96 [ 1607.889355] FAT-fs (loop7): bogus number of reserved sectors [ 1607.890781] FAT-fs (loop7): Can't find a valid FAT filesystem 13:27:55 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={&(0x7f0000004cc0)={0x24, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82a08, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f00000000c0)) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x409becb7bdf85d3, 0x1, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000004c40)={0xa, 0x4e21, 0x2, @private0, 0x600000}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) sendmsg$NL80211_CMD_SET_CQM(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="0620cdd5ab279bdb2a9094451c416cc859ae46c3657d01ad226423b6924ac58823e60d861afab3b8814381d15e9af773245a61061bd9076c9a22ea372a1908410d9ede", @ANYRES16=0x0, @ANYBLOB="0b0c0000000000000000000000007f0b00b6216f37343f00000008000300", @ANYRES32=0x0, @ANYBLOB="10005e80040001000800020000000000"], 0x2c}}, 0x0) sendmsg$NL80211_CMD_ABORT_SCAN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x0, 0x4, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xfdb3, 0x1a}}}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x4000814) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000500)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) r2 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000540)=0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4, 0x10, r2, 0x0) syz_io_uring_submit(r4, r3, 0x0, 0x20000) openat$rtc(0xffffffffffffff9c, &(0x7f0000003580), 0x8000, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 13:27:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="60916d01648d04ce44d81ef742d4af0002400040006201f38f2c5108fa14290a1823ac77f031c910f63fc2d8cac4c7b06fcdeb97bfc51ae09324190acf462ff5c92f1fe9e9c2dd8df8890a8c698795188bfcdb4175bc5c57259989d4e46f8382009766566848b4fe132616480ce9850cf4a06227c3c448aa76cac78c722193c9b46ed7512254cd10a9b0bd9a2fd6aac6771bd04227bfca85a815ba6c98dbafc6f02ceac52d23c5a4a05e5655b042f3283b5f09424c02d02b4e9588e965447d05cb4cdf464eeeacca305807da1068016050a57ba80385", 0x58}, {0x0, 0x0, 0x802}], 0x40000, &(0x7f0000000140)=ANY=[]) 13:27:55 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344", 0x3, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:27:55 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x4000) readv(0xffffffffffffffff, 0x0, 0x0) 13:27:55 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0xfffffffb, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:27:55 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 1608.276973] isofs_fill_super: bread failed, dev=loop6, iso_blknum=48, block=96 13:27:55 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r0, r1, 0x0, 0x20d315) sendmsg$nl_generic(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000100}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, 0x16, 0x1, 0x70bd25, 0x25dfdbfd, {0x3}, [@generic="fc253c92c4d22660edb7aa537312e49b792968fb428aa0f9d91f04ac3ce8d1d9fbffe3893577935906fc73cb6a6f6e74cc835b646929f3e83dc4dd8f2a46975848aa673fe426f445328470de59fb085177f4a2aa9fca79e9322fadc656", @typed={0x8, 0x50, 0x0, 0x0, @pid}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4004}, 0x805) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000000)=0x8) 13:27:55 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)=0x801) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) dup3(r0, r1, 0x0) readv(r0, &(0x7f00000009c0)=[{&(0x7f00000004c0)=""/214, 0xd6}], 0x1) 13:27:55 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488404cabd15439f170e429dd5057d7d5db566f"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:27:55 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344", 0x3, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1608.390220] FAT-fs (loop7): bogus number of reserved sectors [ 1608.391683] FAT-fs (loop7): Can't find a valid FAT filesystem [ 1608.513621] isofs_fill_super: bread failed, dev=loop6, iso_blknum=48, block=96 13:28:09 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:28:09 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/cpuset.cpus\x00', 0x42, 0x0) dup2(r0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) r4 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f00000016c0)={0xb94d200, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600), {0x14}, &(0x7f0000000640)=""/18, 0x12, &(0x7f0000000680)=""/4096, &(0x7f0000001680)=[0x0, r4, r4, 0x0, r4, 0x0, 0x0], 0x7}, 0x58) r5 = openat2(r2, &(0x7f0000000140)='./file1\x00', &(0x7f0000000240)={0x181000, 0x156, 0x3}, 0x18) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xc9, 0x20, 0x6, 0x0, 0x0, 0x0, 0x21000, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3f, 0x3, @perf_bp={&(0x7f0000000040), 0xa}, 0x1000, 0x7, 0x3, 0x0, 0x0, 0x2, 0x20, 0x0, 0x4a1, 0x0, 0x3}, r4, 0xc, r5, 0x1) sendfile(r2, r3, 0x0, 0x20d315) openat(r2, &(0x7f0000000000)='./cgroup.cpu/cpuset.cpus\x00', 0x20c001, 0x2) io_submit(0x0, 0x1, &(0x7f00000008c0)=[&(0x7f0000000180)={0x0, 0x0, 0x5, 0x1, 0x0, r1, &(0x7f00000000c0)='1q', 0x2}]) 13:28:09 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x1000000) readv(0xffffffffffffffff, 0x0, 0x0) 13:28:09 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:28:09 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344", 0x3, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:28:09 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x80001, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x9, 0x0, 0x19000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = creat(0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000002c0)="003ae42bd34265b44e68d40caa054d168dc1e4872cf365f43392ef6039aa643197f0deb9a13ea4675f6df4173236e5737844083b9cb71e4186532daae5c91fd878ae8c7c37e7ebbe2cac21238c8b3b4a06a5d0f7eceaf815784696050336d33e6b68a117e29bf4cb12704528d8534bd184ea11b6917f91f77dae6b1b3fcb5d10ad054e9f14e4ebbb977a5a9c6a3c28e3d9000681bd6252ddcf6b3a005ed5838d5dd2a467c0b3f3a8966506c804d05e39313e64e9a82f9ca8a36b725c4e47dc11ac0d9b73f97f986a87b8122892bb8489ea4be1e052cd4549999d5ef3531326c0b9edffff7f00000000984004539c562a01353d64cd849fc5f93a1013b173f874699b72fc2eb1a4673a5ccd1eeed55dbee6db9f2480afefd6dc8df65cb349f8eb95daf02b7c765a4675ce2d9ed827a2961b", 0x131, 0x10001) renameat2(0xffffffffffffffff, 0x0, r2, 0x0, 0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 13:28:09 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:28:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/pcie_aspm', 0x103000, 0x8) openat(r2, &(0x7f0000000180)='./file1\x00', 0x4000, 0x8) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x40, 0x88) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x632942, 0x0) openat(r3, &(0x7f00000001c0)='./file0\x00', 0x80200, 0x12) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) openat(r5, &(0x7f0000000200)='./file1\x00', 0x80001, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001340)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="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"]) r6 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000300)=0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r6, 0x50009418, &(0x7f0000000340)={{}, r7, 0x2, @unused=[0x8f2a], @subvolid}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000300)={{r3}, r7, 0x4, @unused=[0x0, 0x3, 0x0, 0x5], @name="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"}) sendfile(r0, r1, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0xb0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2149c0, 0x14) 13:28:09 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0xf0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x10, r0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_complete(r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000300)={{0xffff}, 0x100, './file1\x00'}) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/igmp6\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xfff, 0x0) io_uring_enter(r2, 0x5fea, 0x34a6, 0x2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f00000000c0)={@remote, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r4 = epoll_create(0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000100)={0x30000000}) fcntl$setlease(r5, 0x400, 0x2) [ 1622.606340] FAT-fs (loop7): bogus number of reserved sectors [ 1622.606963] FAT-fs (loop7): Can't find a valid FAT filesystem [ 1622.628925] isofs_fill_super: bread failed, dev=loop6, iso_blknum=48, block=96 13:28:10 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:28:10 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff43443030", 0x5, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1622.800285] Process accounting paused [ 1622.814015] isofs_fill_super: bread failed, dev=loop6, iso_blknum=48, block=96 13:28:10 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x2000000) readv(0xffffffffffffffff, 0x0, 0x0) 13:28:10 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:28:10 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}]}) r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x4, 0x28, 0x3, 0x0, 0x4, 0x202, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x1ff, 0x5}, 0x40100, 0xfff, 0x7fff, 0x3, 0x1, 0x1, 0x8001, 0x0, 0xffff, 0x0, 0x10000}, 0x0, 0x1, 0xffffffffffffffff, 0x0) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x3, 0xc8, 0x3, 0x7f, 0x0, 0x4, 0x8069, 0x4, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4, @perf_bp={&(0x7f00000000c0), 0xa}, 0x9854, 0x4db, 0x0, 0x4, 0xfffffffffffffffd, 0x3, 0x9, 0x0, 0x3, 0x0, 0x5}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0xa) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0xffffffffffffffff) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000300)=0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f00000002c0)='./file0\x00', r1, r2) pwrite64(r0, &(0x7f0000000280)="92dd0ecb146abba5", 0x8, 0x3) [ 1622.959694] FAT-fs (loop7): bogus number of reserved sectors [ 1622.961145] FAT-fs (loop7): Can't find a valid FAT filesystem [ 1623.035527] EXT4-fs (loop4): mounted filesystem without journal. Opts: usrjquota=,,errors=continue 13:28:29 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff43443030", 0x5, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:28:29 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080)=0x5, 0x4, 0x1) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:28:29 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:28:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x2042, 0x100) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x8010, &(0x7f00000004c0)=ANY=[]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, &(0x7f0000000140)=0x10) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x1a180, 0x88) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f00000002c0)='./file0\x00', 0x10001, 0x4, &(0x7f0000001580)=[{&(0x7f0000000300)="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", 0x1000, 0x7}, {&(0x7f0000001300)="70476cd331d99124dbfb49ef0a64196b77db756005854990f8094e0321ca653cccbbfd7567b4aaf712703f5aa99e4810cf013bf1331b862066bc429197488e0ab8e64a34b60d54c5d68d21156a6257f21389891043861f162dcb96ec16624046e597ebdab3310c5723a11cd8dea2c04e64bda06e7e5072d00d52aa402754af32b457711751133defbcdb965ca9e5e2809d13912caaf409cb7b71d80ded4da0ff8deb6e3c0b6a1611b22a2407670d10495e09b0c285758dee981a14bec5c5e4e160db8e1f25f185f0", 0xc8, 0x3}, {&(0x7f0000001400)="4fe74d55da03109c1c596512912a773abbccf6ed3ba4cca1628083db1c624b9c94fc209d3c7b454dea7169779596b95ba9bfa294eeb712323ec06d75d26b766526a0ec7a4a0b7f9759890f0c0fe0458deac90aa2a75b77a1d0041657f662469e7fbbee124e5fa98b3b59463f6cf3aadc742bcc06c38fd8a9f753020e11e2244c2bfdc61d8ae35bc4442a67a9cd2798128c7eb19d558d66b574e3b22c609d7e8c5a6b10d685b60fc697a22da8a9242a6a5740fec559f1d6f16752bd19c0f89cbc71c88e3d0f5a22b92fa2ad", 0xcb, 0x800}, {&(0x7f0000001500)="e9d0abd41a5f01c6f3092b0d325af4ceff84b29a79bb97639c71194fbc8d40c8d851c78a2cfbfd617e0b54205ab77603475dc2d945df1421d9e746c3a916de17f264f0e191b085e961a6a9ae2fae8c43466c2e649628cec1f52d4057cb15c931b08536e9f46678c99e91c8ad57d0", 0x6e, 0xfffffffffffffff8}], 0x800, &(0x7f0000001600)=ANY=[@ANYBLOB='nouser_xattr,defcontext=staff_u,uid=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) 13:28:29 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r3, r4, 0x0, 0x20d315) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000440)={'team_slave_1\x00', 0x3f}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)={0x44, 0x4, 0x6, 0x101, 0x0, 0x0, {0x5, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x4044000) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, &(0x7f0000000040)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 13:28:29 executing program 3: syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="057e49069d18f9fdbcdd704636025183f55806c3296cb6363f28cef4a3fdf9c4b47a0d087b6f05a4b83e070cc93684cf965c1f1a115c92fbe74bec40f6359ab413ad9f5d3c7c9c3957027e63cf7e4ed434594f0c20969609002a124fcffc9f4a5a00000000ff00"/112], &(0x7f0000000180)='/dev/loop-control\x00', 0x12, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'wg0\x00'}) io_uring_setup(0x640f, &(0x7f00000000c0)={0x0, 0x0, 0x8, 0x8002, 0x89}) socket$inet(0x2, 0xa, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, &(0x7f0000000140)) sendfile(r0, 0xffffffffffffffff, 0x0, 0x3fb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x2) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) 13:28:29 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x3000000) readv(0xffffffffffffffff, 0x0, 0x0) 13:28:29 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) [ 1642.575261] FAT-fs (loop7): bogus number of reserved sectors [ 1642.576560] FAT-fs (loop7): Can't find a valid FAT filesystem [ 1642.682838] isofs_fill_super: bread failed, dev=loop6, iso_blknum=48, block=96 [ 1642.687001] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:28:30 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1642.752240] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1642.804884] EXT4-fs (loop4): Unrecognized mount option "ŽÚ^S<ñ¶´¸õpxÆø»S˜C”ŒÏaeîÌŽµlj" or missing value 13:28:30 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff43443030", 0x5, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1642.879135] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 13:28:30 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:28:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f0000000140)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0xc4800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r1, r2, 0x0, 0x20d315) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e20, 0x2c000000, @mcast1, 0x5}, 0x1c) clone3(&(0x7f0000002200)={0x201020280, &(0x7f0000000000), &(0x7f0000000440), &(0x7f0000000480), {0x1b}, &(0x7f00000004c0)=""/159, 0x9f, &(0x7f00000001c0)=""/196, &(0x7f00000021c0)=[r0, 0x0, 0x0, r0], 0x4}, 0x58) openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x90101, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000100)='/\x00', &(0x7f0000000400)='\'}((1}%\x00', &(0x7f0000000580)='#:\x00'], &(0x7f0000001a00)=[&(0x7f0000000600)='!@&\'V^\\-L].@\x0e:\x00'], 0x100) writev(0xffffffffffffffff, &(0x7f0000002b80)=[{&(0x7f0000000080)='1', 0x1}], 0x1) 13:28:30 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:28:30 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xc000000) readv(0xffffffffffffffff, 0x0, 0x0) 13:28:30 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r3, r4, 0x0, 0x20d315) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000440)={'team_slave_1\x00', 0x3f}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)={0x44, 0x4, 0x6, 0x101, 0x0, 0x0, {0x5, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x4044000) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, &(0x7f0000000040)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) [ 1643.030323] isofs_fill_super: bread failed, dev=loop6, iso_blknum=48, block=96 13:28:30 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000400)={0x0, 0x0}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='fd\x00') getdents(r2, &(0x7f0000001d00)=""/4096, 0x1000) perf_event_open(0x0, r1, 0x7, r2, 0x0) readv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000600)=""/251, 0xfb}, {0x0}, {&(0x7f00000002c0)=""/56, 0x38}, {&(0x7f0000003e40)=""/4096, 0x1000}, {&(0x7f0000000980)=""/178, 0xb2}, {&(0x7f0000004e40)=""/4096, 0x1000}, {&(0x7f0000000a40)=""/212, 0xd4}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x8) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='fd\x00') getdents(r3, &(0x7f0000001d00)=""/4096, 0x1000) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x80500) sendmsg$nl_xfrm(r4, &(0x7f0000001700)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000016c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x4000040) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/48) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RREADLINK(r5, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x10) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r6, 0x29, 0x1b, &(0x7f0000000080)={@remote, r8}, 0x14) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)={@local, @multicast1, r8}, 0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000040)={@mcast1, 0x20, r8}) 13:28:30 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:28:30 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1643.198246] FAT-fs (loop7): bogus number of reserved sectors [ 1643.199570] FAT-fs (loop7): Can't find a valid FAT filesystem 13:28:45 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:28:45 executing program 4: perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x5, 0x0, 0x4, 0x0, 0x4, 0xa2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x8002, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) clone3(0x0, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), 0xffffffffffffffff) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/asound/seq/clients\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000740)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="110d00faffffff000000700000000c0099000000000000400000e5288653d6b4ce79bc5a283ec972f2c406038ec5c61e790f9068cb6bafee4006fe2410bff11b8713bb5ed3f946032bcd08f99b9f8910e00957714e622659d049"], 0x20}}, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) r2 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) io_uring_enter(r3, 0x3ecd, 0xebe6, 0x2, &(0x7f00000005c0)={[0xa4]}, 0x8) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000800), 0x2, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, 0x0, 0x5, 0x0, 0x0, {{0x17}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_MCAST_RATE(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010029bd7000ffdbdf255c00000008000300", @ANYRES32=0x0, @ANYBLOB="08006b00f000"/24], 0x34}, 0x1, 0x0, 0x0, 0x4044814}, 0x80) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="d2021100", @ANYRES16=0x0, @ANYBLOB="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"], 0x2c4}, 0x1, 0x0, 0x0, 0x4048875}, 0x4000) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000100)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010000000000000000576800000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900000000000000000008005200", @ANYRES32=r2, @ANYBLOB], 0x30}}, 0x0) 13:28:45 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:28:45 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:28:45 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r3, r4, 0x0, 0x20d315) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000440)={'team_slave_1\x00', 0x3f}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)={0x44, 0x4, 0x6, 0x101, 0x0, 0x0, {0x5, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x4044000) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, &(0x7f0000000040)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 13:28:45 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:28:45 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x3e000000) readv(0xffffffffffffffff, 0x0, 0x0) 13:28:45 executing program 3: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1f, "77004a6efdff002200000200cdab000245b00f", 0x1}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) socket$inet(0x2, 0xa, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) lseek(0xffffffffffffffff, 0x7, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x840}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DVD_READ_STRUCT(0xffffffffffffffff, 0x40081271, &(0x7f0000000580)=@physical={0x0, 0x2}) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000000), 0x1e02, 0x0) r1 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000000), 0x1e02, 0x0) ioctl$DVD_READ_STRUCT(r1, 0x40081271, &(0x7f0000000580)=@physical={0x0, 0x2, [{}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000001) ioctl$BTRFS_IOC_QUOTA_CTL(r2, 0xc0109428, &(0x7f0000000040)={0x3, 0x9}) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000000), 0x1e02, 0x0) ioctl$DVD_READ_STRUCT(0xffffffffffffffff, 0x40081271, &(0x7f0000000580)=@physical={0x0, 0x2}) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000180)={0x5, 0x0, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x9) [ 1657.974939] FAT-fs (loop7): bogus number of reserved sectors [ 1657.976050] FAT-fs (loop7): Can't find a valid FAT filesystem [ 1658.067126] isofs_fill_super: bread failed, dev=loop6, iso_blknum=48, block=96 13:28:45 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:28:45 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1658.198648] Process accounting resumed 13:28:45 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100000, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000000640)={&(0x7f0000000140), 0x6e, &(0x7f0000000500)=[{&(0x7f00000001c0)=""/120, 0x78}, {&(0x7f0000000240)=""/209, 0xd1}, {&(0x7f0000000340)=""/205, 0xcd}, {&(0x7f0000000440)=""/53, 0x35}, {&(0x7f0000000480)=""/113, 0x71}], 0x5, &(0x7f0000000580)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}, 0x12100) close(r2) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x400200, 0x0) r6 = getuid() setresuid(0xee01, 0xee01, r6) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000100)={'bridge_slave_1\x00', {0x2, 0x0, @initdev}}) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f00000000c0)={0x0, r1, 0x7fff, 0x6, 0x2, 0x2}) perf_event_open(&(0x7f0000000000)={0x6, 0x80, 0x5, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x2c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:28:45 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x40000000) readv(0xffffffffffffffff, 0x0, 0x0) 13:28:45 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r3, r4, 0x0, 0x20d315) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000440)={'team_slave_1\x00', 0x3f}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)={0x44, 0x4, 0x6, 0x101, 0x0, 0x0, {0x5, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x4044000) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, &(0x7f0000000040)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 13:28:45 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:28:45 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:28:45 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1658.402705] isofs_fill_super: bread failed, dev=loop6, iso_blknum=48, block=96 13:29:02 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:29:02 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:29:02 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r3, r4, 0x0, 0x20d315) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000440)={'team_slave_1\x00', 0x3f}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)={0x44, 0x4, 0x6, 0x101, 0x0, 0x0, {0x5, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x4044000) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, &(0x7f0000000040)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) [ 1675.053325] isofs_fill_super: bread failed, dev=loop6, iso_blknum=48, block=96 13:29:02 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xfdfdffff) readv(0xffffffffffffffff, 0x0, 0x0) 13:29:02 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:29:02 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:29:02 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@ceph_nfs_confh={0x10, 0x2, {0xb, 0x4000000}}, 0x0) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000100)) 13:29:02 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0xfffffff8, @private2, 0x1}, 0x1c) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$SMC_PNETID_DEL(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, 0x0, 0x300, 0x70bd25, 0x25dfdbfe, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'wlan0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x40011}, 0x10090) sendmmsg$inet6(r0, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="4bc702854e3954b59347985ccc868289d3fe483d2c0900a2a1d12e33a66529e1f276fef452632dfa3c004ce3be84a5f66c29cd4ec39ae5206562fbc9ea3c0dbbebc22e628e147b0e9631f19b0ce0a48e0e675b2da3442226b898f1ddf8eabf133ab4a9cb0999c2ee1d3bd36d089b0d8e97ea00d4c5f6ad14dce058d595aacba2d587ff5eacd81b71a73f53ed276d1f3b3384bb2bfba4e0f37302e690df9e7024378ac754ac0576f996f3ee53d1034c7720767ddf2625817532f7ae89103367b73a36152b84c38bc227ba9e9ff48bcfe027585cf14bff37a888", 0xd9}], 0x1}}], 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) fsync(r3) 13:29:02 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1675.098578] FAT-fs (loop7): bogus number of reserved sectors [ 1675.099899] FAT-fs (loop7): Can't find a valid FAT filesystem [ 1675.123749] ISOFS: Unable to identify CD-ROM format. 13:29:02 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:29:02 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@ceph_nfs_confh={0x10, 0x2, {0xb, 0x4000000}}, 0x0) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000100)) 13:29:02 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:29:02 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xfffffdfd) readv(0xffffffffffffffff, 0x0, 0x0) 13:29:02 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r3, r4, 0x0, 0x20d315) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000440)={'team_slave_1\x00', 0x3f}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)={0x44, 0x4, 0x6, 0x101, 0x0, 0x0, {0x5, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x4044000) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, &(0x7f0000000040)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) 13:29:18 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:29:18 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:29:18 executing program 4: r0 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffe, 0x0, 0x0) r1 = request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x0, 0x2}, &(0x7f0000000440)='\xe8\xff\xff\xff\xff\xff\xff\xff\x00\x9d\x00\xf1\xad\xa2.\x803\x7f\xb5U\x18w\xae\x91mLO\x85\xc1D\xf8/\x19Vc\xb0\xc8\xaba\xa9T\xb2\xa4\x9d8\x13kc|Lgj V{\xddKF\xbb6\xf5\xa2\xe5\\/\xf0]\xe6\x0e2\xb5o4\xba\x98\x1e{\xcfZ\x1d\x84\xe0\xa5V\x1c3\xd78A\x9eK\x16\xfcXD\xe3\x9a,W\xb3\xc0\xeb\xcd\xf6\x89\x95\x9e\xa9\xc2H\xc5\xaa\xd8\x101!\xa3\x83\x1b\x83m\xe3RK8\xeby\xaa\x88\x94a\xea\xab#\xce*\x0f\xa0\x8c\xca\x15\xea\xdaf:\xf6\x1b\xbf\x9fR\xba\xb5\xb0\xf7\xf5g\xb1\xdcU;\x1bL\xbd\v\xc4\xf8\xf5\xd8\xd3\xba\x8a5\xa0\x00\xc2\xd7\xe0Y\xd3\xa27\xb4S\xb1bd\x05\x9bD\x01\x85b5U\xb4\x8c\x17\xf4f0P\x9f\xe9`W\xb4\xe0\xf0\x19\xc2\x87P><\xb48\xd2Jb,7\xdc2/\xdd_\xdbXT\xffZ\x12p\xac\xdb[\x00\x00\x00\xf1\xdc\xd4\x99C9\x90\x10T\xf4:\xd6\x15\xff\xe06\x99iM;\xd6\x8c\x96\xdes\xa2\xa7v>\xd8W\xf6B\x9e-*\x83\x1c\xe1\x04\x15E\xa2\xe2S\xee\xb1\x97B\xa7\x9cKN\xfb\x14m\x84\x85A\xb7\x10g\x86\x04\x148{\vh\x14\x94\x81?\x14\xc7\xb5\xd9\xc1\x8f\x9e\xb9l\xbb\xb1H\xa3e\x7f-\xfb\xc2L\xe5\xf6p\xc5\x82\xcb\x85\xe80\xaf6\xf3\xd5\xa1\xe0\xc9\xe6\xb0', r0) r2 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x0, 0x2}, &(0x7f0000000440)='\xe8\xff\xff\xff\xff\xff\xff\xff\x00\x9d\x00\xf1\xad\xa2.\x803\x7f\xb5U\x18w\xae\x91mLO\x85\xc1D\xf8/\x19Vc\xb0\xc8\xaba\xa9T\xb2\xa4\x9d8\x13kc|Lgj V{\xddKF\xbb6\xf5\xa2\xe5\\/\xf0]\xe6\x0e2\xb5o4\xba\x98\x1e{\xcfZ\x1d\x84\xe0\xa5V\x1c3\xd78A\x9eK\x16\xfcXD\xe3\x9a,W\xb3\xc0\xeb\xcd\xf6\x89\x95\x9e\xa9\xc2H\xc5\xaa\xd8\x101!\xa3\x83\x1b\x83m\xe3RK8\xeby\xaa\x88\x94a\xea\xab#\xce*\x0f\xa0\x8c\xca\x15\xea\xdaf:\xf6\x1b\xbf\x9fR\xba\xb5\xb0\xf7\xf5g\xb1\xdcU;\x1bL\xbd\v\xc4\xf8\xf5\xd8\xd3\xba\x8a5\xa0\x00\xc2\xd7\xe0Y\xd3\xa27\xb4S\xb1bd\x05\x9bD\x01\x85b5U\xb4\x8c\x17\xf4f0P\x9f\xe9`W\xb4\xe0\xf0\x19\xc2\x87P><\xb48\xd2Jb,7\xdc2/\xdd_\xdbXT\xffZ\x12p\xac\xdb[\x00\x00\x00\xf1\xdc\xd4\x99C9\x90\x10T\xf4:\xd6\x15\xff\xe06\x99iM;\xd6\x8c\x96\xdes\xa2\xa7v>\xd8W\xf6B\x9e-*\x83\x1c\xe1\x04\x15E\xa2\xe2S\xee\xb1\x97B\xa7\x9cKN\xfb\x14m\x84\x85A\xb7\x10g\x86\x04\x148{\vh\x14\x94\x81?\x14\xc7\xb5\xd9\xc1\x8f\x9e\xb9l\xbb\xb1H\xa3e\x7f-\xfb\xc2L\xe5\xf6p\xc5\x82\xcb\x85\xe80\xaf6\xf3\xd5\xa1\xe0\xc9\xe6\xb0', r2) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r3 = add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r3, 0xfffffffffffffffe, 0x0, 0x0) r4 = request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x0, 0x2}, &(0x7f0000000440)='\xe8\xff\xff\xff\xff\xff\xff\xff\x00\x9d\x00\xf1\xad\xa2.\x803\x7f\xb5U\x18w\xae\x91mLO\x85\xc1D\xf8/\x19Vc\xb0\xc8\xaba\xa9T\xb2\xa4\x9d8\x13kc|Lgj V{\xddKF\xbb6\xf5\xa2\xe5\\/\xf0]\xe6\x0e2\xb5o4\xba\x98\x1e{\xcfZ\x1d\x84\xe0\xa5V\x1c3\xd78A\x9eK\x16\xfcXD\xe3\x9a,W\xb3\xc0\xeb\xcd\xf6\x89\x95\x9e\xa9\xc2H\xc5\xaa\xd8\x101!\xa3\x83\x1b\x83m\xe3RK8\xeby\xaa\x88\x94a\xea\xab#\xce*\x0f\xa0\x8c\xca\x15\xea\xdaf:\xf6\x1b\xbf\x9fR\xba\xb5\xb0\xf7\xf5g\xb1\xdcU;\x1bL\xbd\v\xc4\xf8\xf5\xd8\xd3\xba\x8a5\xa0\x00\xc2\xd7\xe0Y\xd3\xa27\xb4S\xb1bd\x05\x9bD\x01\x85b5U\xb4\x8c\x17\xf4f0P\x9f\xe9`W\xb4\xe0\xf0\x19\xc2\x87P><\xb48\xd2Jb,7\xdc2/\xdd_\xdbXT\xffZ\x12p\xac\xdb[\x00\x00\x00\xf1\xdc\xd4\x99C9\x90\x10T\xf4:\xd6\x15\xff\xe06\x99iM;\xd6\x8c\x96\xdes\xa2\xa7v>\xd8W\xf6B\x9e-*\x83\x1c\xe1\x04\x15E\xa2\xe2S\xee\xb1\x97B\xa7\x9cKN\xfb\x14m\x84\x85A\xb7\x10g\x86\x04\x148{\vh\x14\x94\x81?\x14\xc7\xb5\xd9\xc1\x8f\x9e\xb9l\xbb\xb1H\xa3e\x7f-\xfb\xc2L\xe5\xf6p\xc5\x82\xcb\x85\xe80\xaf6\xf3\xd5\xa1\xe0\xc9\xe6\xb0', r3) r5 = add_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="c917e48bea2bd5f5918891f24d745f806d5e64910c977a918a1e514e7b9928bbe5bd5c104b354e72da46b8e7c3a1da4bf6336746e95bba25aa4232925d22a3cc96e69c46fdbe96b8f895a125f82adc3d7ac0f93a1314686072349780cdfeff2bc2f6cfc13ab7df50a0db85d05c034d3d9231778a6141c1676123160305960bb0aa0fd1d704209f090bf67bf9ae31f0adf4f0d68e43a5b236e8796818acd9171372c1050fabb19083baf0381f915fda7115239c4bcd762cccf794186bc8f2db43ec3ac733cc6cb87094b0881a30fb0fc675fd37ddfaab4fb94e6a0d3b7fbdcfa2f88979821164", 0xe6, r1) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, r5) r6 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x17}, 0x3}, 0x1c) connect$inet6(r6, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r6, &(0x7f0000004d00)=[{{0x0, 0x1100, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)={0x0, 0x0, @a}, 0x48, r4) 13:29:18 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:29:18 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:29:18 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:29:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r3, r4, 0x0, 0x20d315) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000440)={'team_slave_1\x00', 0x3f}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)={0x44, 0x4, 0x6, 0x101, 0x0, 0x0, {0x5, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x4044000) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, &(0x7f0000000040)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) 13:29:18 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x1000000000000) readv(0xffffffffffffffff, 0x0, 0x0) [ 1691.066461] ISOFS: Unable to identify CD-ROM format. [ 1691.082673] FAT-fs (loop7): bogus number of reserved sectors [ 1691.083937] FAT-fs (loop7): Can't find a valid FAT filesystem 13:29:18 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:29:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r3, r4, 0x0, 0x20d315) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000440)={'team_slave_1\x00', 0x3f}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)={0x44, 0x4, 0x6, 0x101, 0x0, 0x0, {0x5, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x4044000) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, &(0x7f0000000040)) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) [ 1691.193797] Process accounting paused 13:29:18 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:29:18 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x100000000000000) readv(0xffffffffffffffff, 0x0, 0x0) [ 1691.257284] ISOFS: Unable to identify CD-ROM format. 13:29:18 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:29:18 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:29:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r3, r4, 0x0, 0x20d315) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000440)={'team_slave_1\x00', 0x3f}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)={0x44, 0x4, 0x6, 0x101, 0x0, 0x0, {0x5, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x4044000) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 13:29:18 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:29:18 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 1691.425171] ISOFS: Unable to identify CD-ROM format. [ 1691.435359] FAT-fs (loop7): bogus number of reserved sectors [ 1691.436577] FAT-fs (loop7): Can't find a valid FAT filesystem 13:29:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r3, r4, 0x0, 0x20d315) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000440)={'team_slave_1\x00', 0x3f}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)={0x44, 0x4, 0x6, 0x101, 0x0, 0x0, {0x5, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x4044000) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 13:29:34 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x200000000000000) readv(0xffffffffffffffff, 0x0, 0x0) 13:29:34 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488404cabd15439"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:29:34 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:29:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r2, r3, 0x0, 0x20d315) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000440)={'team_slave_1\x00', 0x3f}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)={0x44, 0x4, 0x6, 0x101, 0x0, 0x0, {0x5, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x4044000) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 13:29:34 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:29:34 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:29:34 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:29:34 executing program 4: timer_create(0x2, 0x0, &(0x7f0000000040)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x77359400}, {0x0, 0x989680}}, 0x0) timer_create(0x3, &(0x7f0000000200)={0x0, 0x2b, 0x0, @thr={&(0x7f0000000140)="9ad1fca9dd0bf9f18071619f8cdf64928f94f9196072f6f55bc28a41119d50e531ebdd38000fc2bb98736103a298f5686bcfa4faf40290011153aabfbbd6e31b9e9977375219ff3ce5fec4da2126d2ab66790ef25443ca29868ba5e406220ff82c288332ee14b4a729f8d5c33ba5b864ab5ab8ce328bc442d7d14540c964a34644045d3af1280c34ed94a3d6ce9a9b9562ce9863e16d3e59bc49e6220bfd", &(0x7f0000000000)="b3d72a30c6c26f634c317480f89eac"}}, &(0x7f0000000240)) timer_delete(0x0) clone3(&(0x7f00000000c0)={0x40182b00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) timer_getoverrun(r0) [ 1707.113894] ISOFS: Unable to identify CD-ROM format. [ 1707.136721] FAT-fs (loop7): bogus number of reserved sectors [ 1707.138168] FAT-fs (loop7): Can't find a valid FAT filesystem 13:29:34 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:29:34 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:29:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r2, r3, 0x0, 0x20d315) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000440)={'team_slave_1\x00', 0x3f}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)={0x44, 0x4, 0x6, 0x101, 0x0, 0x0, {0x5, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x4044000) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 13:29:34 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x300000000000000) readv(0xffffffffffffffff, 0x0, 0x0) 13:29:34 executing program 4: creat(&(0x7f0000000040)='./file0\x00', 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000a40), 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000)={0x5, 0x3, 0xfc01, 0x80, 0x73, 0x3}, 0xc) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/protocols\x00') r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 1707.318544] ISOFS: Unable to identify CD-ROM format. 13:29:50 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488404cabd15439"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:29:50 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xc00000000000000) readv(0xffffffffffffffff, 0x0, 0x0) 13:29:50 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:29:50 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:29:50 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:29:50 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$AUTOFS_IOC_READY(r0, 0x9360, 0xc1) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) fork() mmap$usbmon(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x1000000, 0x10, 0xffffffffffffffff, 0x100000001) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x12) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000001300)={0x3, 0x8, 0x0, 0x4, 0x81}) mmap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x8, 0x2010, 0xffffffffffffffff, 0x283f9000) syz_io_uring_setup(0x4, &(0x7f0000000080), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000140)) 13:29:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r2, r3, 0x0, 0x20d315) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000440)={'team_slave_1\x00', 0x3f}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)={0x44, 0x4, 0x6, 0x101, 0x0, 0x0, {0x5, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x4044000) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 13:29:50 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 1723.407980] FAT-fs (loop7): bogus number of reserved sectors [ 1723.408801] FAT-fs (loop7): Can't find a valid FAT filesystem [ 1723.416050] ISOFS: Unable to identify CD-ROM format. 13:29:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r3, r4, 0x0, 0x20d315) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000440)={'team_slave_1\x00', 0x3f}) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) [ 1723.460425] Process accounting resumed 13:29:50 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x3e00000000000000) readv(0xffffffffffffffff, 0x0, 0x0) 13:29:50 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:29:50 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:29:50 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x80000000}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffff, 0x5, "f31afa00434ef9bab774bdca0d00"}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r1 = socket$inet(0x2, 0xa, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x4b72, &(0x7f00000005c0)={0x0, 0x1, 0x1a, 0x13, 0x9, &(0x7f00000001c0)="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"}) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000100)={@mcast1, 0x32}) sendfile(r2, 0xffffffffffffffff, 0x0, 0x9bbb) openat$tun(0xffffffffffffff9c, &(0x7f0000000640), 0x8000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x850480, 0x0) r3 = syz_open_dev$rtc(&(0x7f0000000040), 0x5, 0x4c8000) flock(r3, 0x8) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000080)={0x800, 0xffffffff, 0x2}) 13:29:51 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1723.684772] ISOFS: Unable to identify CD-ROM format. 13:29:51 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:29:51 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:29:51 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x4000000000000000) readv(0xffffffffffffffff, 0x0, 0x0) 13:29:51 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 1723.902826] FAT-fs (loop7): invalid media value (0x00) [ 1723.904101] FAT-fs (loop7): Can't find a valid FAT filesystem 13:30:06 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:30:06 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 1) 13:30:06 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:30:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r3, r4, 0x0, 0x20d315) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000440)={'team_slave_1\x00', 0x3f}) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 13:30:06 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:30:06 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x3e00000000000000) readv(0xffffffffffffffff, 0x0, 0x0) 13:30:06 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xfdfdffff00000000) readv(0xffffffffffffffff, 0x0, 0x0) [ 1739.158765] FAULT_INJECTION: forcing a failure. [ 1739.158765] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1739.160687] CPU: 1 PID: 11421 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1739.161758] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1739.163070] Call Trace: [ 1739.163486] dump_stack+0x107/0x167 [ 1739.164055] should_fail.cold+0x5/0xa [ 1739.164646] _copy_from_user+0x2e/0x1b0 [ 1739.165261] perf_copy_attr+0x11a/0x8a0 [ 1739.165873] __do_sys_perf_event_open+0xb9/0x2d50 [ 1739.166622] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1739.167368] ? perf_event_set_output+0x5b0/0x5b0 [ 1739.168100] ? wait_for_completion_io+0x270/0x270 [ 1739.168858] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1739.169677] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1739.170513] do_syscall_64+0x33/0x40 [ 1739.171119] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1739.171905] RIP: 0033:0x7f6eb84dfb19 [ 1739.172487] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1739.175331] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1739.176497] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1739.177600] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1739.178714] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1739.179834] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1739.180990] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 13:30:06 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 1739.207244] blktrace: Concurrent blktraces are not allowed on sg0 [ 1739.209444] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 1739.217959] FAT-fs (loop7): invalid media value (0x00) [ 1739.218932] FAT-fs (loop7): Can't find a valid FAT filesystem 13:30:06 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:30:06 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 2) 13:30:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r3, r4, 0x0, 0x20d315) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000440)={'team_slave_1\x00', 0x3f}) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 13:30:06 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:30:06 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) [ 1739.412468] FAULT_INJECTION: forcing a failure. [ 1739.412468] name failslab, interval 1, probability 0, space 0, times 1 [ 1739.414416] CPU: 1 PID: 11444 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1739.415766] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1739.417192] Call Trace: [ 1739.417652] dump_stack+0x107/0x167 [ 1739.418270] should_fail.cold+0x5/0xa [ 1739.418916] ? perf_event_alloc.part.0+0x5b/0x2b70 [ 1739.419773] should_failslab+0x5/0x20 [ 1739.420433] kmem_cache_alloc_trace+0x55/0x320 [ 1739.421220] perf_event_alloc.part.0+0x5b/0x2b70 [ 1739.422014] ? __alloc_fd+0x2b8/0x630 [ 1739.422672] __do_sys_perf_event_open+0x580/0x2d50 [ 1739.423514] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1739.424356] ? perf_event_set_output+0x5b0/0x5b0 [ 1739.425157] ? wait_for_completion_io+0x270/0x270 [ 1739.426009] ? __startup_64+0x9/0x3b0 [ 1739.426667] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1739.427299] blktrace: Concurrent blktraces are not allowed on sg0 [ 1739.427581] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1739.427603] do_syscall_64+0x33/0x40 [ 1739.430591] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1739.431489] RIP: 0033:0x7f6eb84dfb19 [ 1739.432128] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1739.435272] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1739.436567] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1739.437786] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1739.439016] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1739.440240] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1739.441465] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 13:30:06 executing program 1: syz_emit_ethernet(0xf, 0x0, &(0x7f0000000180)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x70, 0x0, 0xad, 0x0, 0x0, 0x0, 0x200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) fcntl$dupfd(r1, 0x0, r2) r3 = mq_open(&(0x7f0000000080)='@\x00', 0x2, 0x81, &(0x7f00000000c0)={0xd6, 0x821d, 0x69, 0xffffffffffffcaef}) sendfile(r3, r0, &(0x7f0000000100)=0x100000000, 0xffff) syz_emit_ethernet(0x115, &(0x7f00000002c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @link_local, @val={@val={0x9100, 0x6, 0x1, 0x4}, {0x8100, 0x2, 0x0, 0x3}}, {@ipv6={0x86dd, @tipc_packet={0x6, 0x6, "defcfa", 0xd7, 0x6, 0xff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', {[@routing={0x8, 0x6, 0x1, 0x81, 0x0, [@rand_addr=' \x01\x00', @private0={0xfc, 0x0, '\x00', 0x1}, @remote]}, @routing={0x33, 0xc, 0x2, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}, @rand_addr=' \x01\x00', @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, @local, @empty]}, @fragment={0x88, 0x0, 0x0, 0x0, 0x0, 0xc, 0x65}], @payload_named={{{{{0x2f, 0x0, 0x1, 0x1, 0x1, 0xa, 0x2, 0x2, 0x81, 0x0, 0x3, 0xf, 0x3, 0x2, 0x7f, 0x0, 0x1, 0x4e23, 0x4e21}, 0x3, 0x1}, 0x3, 0x1}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}}}}}, 0x0) close(0xffffffffffffffff) [ 1739.445456] ISOFS: Logical zone size(0) < hardware blocksize(1024) 13:30:06 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:30:07 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 3) 13:30:07 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1739.640945] FAULT_INJECTION: forcing a failure. 13:30:07 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) [ 1739.640945] name failslab, interval 1, probability 0, space 0, times 0 [ 1739.642845] CPU: 1 PID: 11460 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1739.643878] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1739.645140] Call Trace: [ 1739.645550] dump_stack+0x107/0x167 [ 1739.646108] should_fail.cold+0x5/0xa [ 1739.646717] ? create_object.isra.0+0x3a/0xa20 [ 1739.647406] should_failslab+0x5/0x20 [ 1739.647986] kmem_cache_alloc+0x5b/0x310 [ 1739.648600] ? __lockdep_reset_lock+0x180/0x180 [ 1739.649325] create_object.isra.0+0x3a/0xa20 [ 1739.649985] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1739.650769] kmem_cache_alloc_trace+0x151/0x320 [ 1739.651507] perf_event_alloc.part.0+0x5b/0x2b70 [ 1739.652224] ? __alloc_fd+0x2b8/0x630 [ 1739.652866] __do_sys_perf_event_open+0x580/0x2d50 [ 1739.653621] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1739.654392] ? perf_event_set_output+0x5b0/0x5b0 [ 1739.655111] ? wait_for_completion_io+0x270/0x270 [ 1739.655873] ? __startup_64+0x9/0x3b0 [ 1739.656459] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1739.657320] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1739.658100] do_syscall_64+0x33/0x40 [ 1739.658724] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1739.659498] RIP: 0033:0x7f6eb84dfb19 [ 1739.660096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1739.662840] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1739.664049] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1739.665200] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1739.666360] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1739.667538] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1739.668734] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 [ 1739.672230] ISOFS: Logical zone size(0) < hardware blocksize(1024) 13:30:23 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000220000000000002200"/120, 0x78, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:30:23 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:30:23 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r3, r4, 0x0, 0x20d315) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) [ 1756.352229] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 1756.395183] FAT-fs (loop7): invalid media value (0x00) [ 1756.396431] FAT-fs (loop7): Can't find a valid FAT filesystem 13:30:23 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 4) 13:30:23 executing program 1: ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001240)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/fib_trie\x00') ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r0, 0xf502, 0x0) preadv(r2, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/213, 0xd5}, {&(0x7f00000001c0)=""/100, 0x64}], 0x2, 0x0, 0x0) r3 = dup2(r2, r2) pwrite64(r0, &(0x7f0000000000)="4e6fff270356948ace099449909aa6156bd8889869ed02ad96a962eb70a45e3ebd5fdf9c2c04dc7575ce861ebb77306dd8c329ca6aa8", 0x36, 0x3) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000001e00)={0x0, 0x0, "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", "daff654ce44560fece7a1cc477509b85de02587ec717b4566211cb32552a232583694cba11f301f0bb15b74ea0b35110e21c1bcb7ade89cced49c46005a21c8665466f6cf24044e8d0529e5dc8ee805de6ccf1fb9c4ef945a11e2f63a673cd6c8f42f740b1a97c0a02ec1203439477a4c0a663efbed737fc695a6e3f0b6b88a4b4cdf9b37c6699e5ca71090a45ab42bbb1042f391359f42f695cf3ea77ddc93e53c1e2de08c550922e4c60469f1a612cdbd25ccb5e1e1b78c4455f45c141e97aee00eea461557c330fd26ad5d5f987fd54c61ca6c5960604cdc403248ebc8500fef6127ef73f14701bef03c32e06097e88224fafafeaea07dc380a9e94b8a5a0fbeda1cb981fb2c3a9688c0a20d15d11677b4fe28ac51a061dfb941bab075326ac20d507e751b7cace89b60f81d560f62fd4ea2c1d28811cc083b607b1952b2191e3ceaded70c0c8fc30df7ba959caf6b5a1fb98ac45f7f5fd0154e00a20ae5b4c2b8e2a803a56f3f04c8e4b6ac384ad6f5a404a4740b7adfda9a51b91c9a3b4139846ec6a5a291abfd7dc6d6cfd05835418c2c2f4f94731a35d5d1fff92c4409fdf753850da6757a56e93a3b099ae6d502dd27af0292ac9cf3330ef67b9c7a9838d6177afdb4da9695aa84f0e8a9b8fe80f4a8fc6b8d2bc5c7583357d4e422e83f380d0695b76a3c4276b75a70fa4a958b1a315a42a279d5135cfd9c62fb4c2a4b31c2fd768bcb97e0ff0a2df8bc4598fb8ca5ff006fd0a6347e884a4ee51bb3a764a131afe0b51360b6f59c3bf83843621b680e45ec9cc17090066232119ddb57d10dfaa7362c759f97e310edd0c70bade29a361157bbce226ec69fcedc3a5f51aede0de0c43c5701ac6cb31a5a68c5da5aa55423590b904bc7ee3768ee80816bc15523d493073c2b5f746cee2da86d12f63c0cbf42716638338e11089846bcac384b50239e2188342ba250e7ff0aa0c90db1186491f0975d4d13a167d053db0486d84236c342cb6e2367483df5d8750e67d1f4fe7d8b704d799b3bb972e4f5de1c2c7f65f9d9c2d667fc9e0bf0af332b32d942a5d8be0ffb712e253714ef86b3b90acdbf4bc56eab17b6ef4275c9095007f7a4df2e181fedd54b2e4c806b3597e5c2cb46d3a0cdcce1cbe7e2ceca682571c10a92103d916392ffd1649c0817b49a0adc0f9cee5bb1acd2e6d2ca0a200042dc0ca947a3fff649812eab47d085d5ca9c1c314d925246f310c3b59ff2b2045fd78a6f81361c1043672d384cc52ac33ad92a7fa005f42bbcbffb9d68518dc01e9337abf66f0f778bda9dbf9036c69a0dd50318bbc234643fee13bda7f390dc65b31fafa2ee01ad723c446bcda3dd69bbb5c4bdd3d105503203cfd9b2b7598f192b5c4db1931d55bfdc73e2694711f96d3e77a7801978ee04406b1c11b826820a3b6c13e9041f98b857f5ba500a9d3a7eb7d6e92b4314e935ac27c02df9e253eb580d505be8c891aa0e328bbd1df1ef6772e569b9c4adba72d633c7f58eec2a40e22e4872997825f039a0cc15a6f990228856c1fc4c70181aed70dbaf319331f5f44d8e796201a8bf4935e21ee45561c330429874ef94ff007779eaf0d0dc028bb9ac8c01e3c6c0df3d5fa8c153aa16a581776b249496d315df9315709037362b392f071c618684221ee21d2b43a95ede194a6dd86c0ea76aacb87e86abe4a93433e66ad489f4932acfbcfff7f7553fba63a3e3ec09ffae0a3546aec4838e380f1fd91dc9642cdd3e696cbe5a44232ae44d0fff54edbe7cda1ccaa18ad66a083579edca18f651bc6c1548f362ce546ecd5a6f0a3561483b4b093ff4c4f0d3aafb972c78e9b2a0620cd7140814090e793c2d8ed0931746ec08f24c2864322c59b16c7152f53a021745be8fa6bcfb6cf846c0481812356fd0128e45a16b58d22c69752e3f7ffc47f136402485bb25e54c3cb3a39953d81d196fae8bbbab28345d59781f70a084dd7a3a2eb40a462668b1d54700702cdfa0b89cb7202e6339791be7a01387a8c5f839c2e7343f2d9854c1410738bbf56823236718e1bc275b43fc2aeac29211d86248389947f05f0c71af45407533fd26d0e7a3fe855ce2aa0ba50734d3251a081a3305276d8363ff46b911298f7923bd9fd98d39f6d51fd80431be1be9065e64654a5767dc5ad8516067ed3882999c4d6a819a8fc2f0e6f3aaba21ed0a01e8371eca679f750da8925a8f50b0450049ef02d265dcb0d6bf7d8817a4887b3073b06d06c87cd4a57f763b89883903f17c6e180667b0da915ee37d6733b2d4212c21de2838184895ac088350e4305e498294e58dad6e00428fad89d0944a03ff821c79b727923a48d9ad07abd04ee1d9355e3f40407df6a9992240b993f38f7309a4f5a0f23d8335d55cc9ab944e621fd428de132743c2e370b0ca4ab59e85a22df710e27c9d0b00907cbd173c6d733771b6c762bfb27438c12b1efd68e1dc7727b3e7a025039756a09cc0a1368eaff7c9b0db2012a84cde23ab3571f230309beaaa41c1e87f572228b936e25af879c1726d1bcff70fe662f6cd0a94abd393572390e08551577fcaf83c33652dc5c0e60bd7e518ffae4e498136da699f39de0e7466bc414bd28b1b1ad2a86c54b487c02e223d4713832e6f7be98e60f376032ce7ce1a841bb0a43d6fb3424ac192bd1992646d2931680d1d967fb38ee810b937fc22f6e264b166244b8e16b5fe232aa716d90872a963ca9e7af606b90841a1d7033775850ec024a3a4f62a9779ec1ba1b87975183f37defe8ea7893310c27de21c2c1a14534bd98e1955fd06fe6927d98a3b107090f858b628d4da168f4bde23bc4f21018173bcca6f39ece4447951f946c86c746745220a8029a8a8514a1648bdc1eaae1756e76a66787c76792aec26041ddda8eada2b7e7d7ca551cd1d8a9ba9d4a544693f00357f787c4fe51107907df4888483d6a46264f3e14a99f0faeafe261afa406d31b238d7efeb932eb2f1cc1440497b42b79ae32f1456784dbae624937c84aeffde06b0ec416ba9861f9f7a424fb513eea19b210a6d7427dba4a550a12ec4c8a665b5bff10f043f3d1103270ef56cbf159815a1d395cb4e69539e5783dfc0ff8e193a14b68f9ef21c432e452b3ddd35d9518387126d5e4a5e1d47d38691ad2087dd8af711f86d737f0bf076f1a9b772639e593b932681510258b9f603f23802cb3122533070ba6571251371fb9f617f781d55ecaff380e7d3ec6b9e3c795ea1ea7af76749d54ce6c369fa719bd501e1ea3a582b30c332050edd1a2d15004a45e5dacbfb3a83e1cf40450c42614764f6ed77d1608e75d521b1982f445594ad981b2d44ff25a517c949f8b49bc9562da28d4b555d6e49d21bc3ba9dac0de638c8c264d0541a016f5ef21f2d43306363949552d4c3bb80fd3f4cdd33305ad7910c93a9a9c7646f9b39e8c1a08d45ca2e6306eff6ec8a6a9e4e1d3b9569e340414f4a20b2f84a4ffa7fc63981c084caf3441ded951393277304f5392aec6fbf599dea16b136c96d3ee10767afac30bfc3153d95740aaa90e07e2cb708137de40e78e887d9d7525924b47ba97f82fe76ababcd59bc2869e988fc1748384af780ae21a42bc24c07477d6d038594e51354b89680e909aee08ce60f54b576168bb0385dbb6853be1837b19b3ce867454d8591329e9c0390c541132dad64015b6372d8d8b3a7d71b5d72ca4e83baeef7b0da0bf2ca25ad7ea7ce0661df92b67686676d7499f7b1ddc9d4c30d07f9cebb79a6c102f440e25d097bde7ce98db901f884cca294cac25d3ffb761e46dd5b27b8ef5b77b1061e9db8af098c24d3bfd698400a8ba4c928cedc75fdbcf11ef7a9ba2ccb83f6e513d20ca0c8482abc5e153d1979e32214ae81650ec0f91494a37d3c24d3484f7547cba43d850a85acc850db0578798ae3457509bec01d9f2fde1718da9324110e29bd7d1d979e180a00f352bf6629c5076e62a7f8eb953f358d6388d4c6878327a2e4b95581cb7a4b592b86b07530741be01ba74df0551b453c77c043329bec0493f6e4a998c3f3e6de6b4785885c73c0ff34117fb68452b0e60cfac4f250f60994870ede6a9e3aef592b711f8bf66dc18cf743f4a4c9cbca04524b984947bee212e290fbe9d1ea1226d3bbc3ecb6edb03c1cd0eb3b1ec1e5d02a595d7baa1a763b50c3152d37a66621b0cc667776a4f5f54442c0684384e97f792cb5e297c70a268718be81c1778ebaf58fe2f59de8d7393dd36bffba5757ff9e78a0ae0f4606d85a02624e1dd647c50e44dd2166f1e94cac3b3f777dcc362a0e1af9788f5971dfdfdf97fcdd492499b1675a19ed44c3f663fd778d6dc799ca95ce460374175a1b018a1afdd0de6a11fd12e262a09e446e6c41f846893329f799db49d5a2c5e8269aac87cc1d0c2368aa5bdebc1b13c5ebe640095e047d6369dcd1f32155a62fe9592d9a7bcdcc9afbed9d98f6967cb8559bce8c4b7e13dfc47c7029a60cdf67607d8429f4097f41e0900283e604b012a03b2a529716ba416764594d068b42e151015df418d882d331339d22362f41f18188c38d63a0f2856dd28ac85931ac5274ad02493247e63b5ff5e09a3a7c8f78d7e06bebbb99bb364a34ac50e5e9eecb2442a9a1e8d9481069e823454342da08541855887084eb217f7deda044d26d1086f54b44cbac418c0cb24e15751d487240ac45cd54fdfc40de43ee32de00c26895f304b5bfb81a25bf07af38393598b5db80005b14126571d74e11e62ab225d60002a9d6f2cc35fb7ac2af43c350961b6d20497c955b4cea4a7174fef2dd194d7358f3e7a7660e7e66cc9c482ce65d14928142092fbaf359fe84b2541089be1f9d1ef15047b5c97cfb4b2ce56a2a28bf8307cb748f1f5eabc9a0d3451fd209440984d4b3168afd98acbee9e1997a4c3225727114787b8978e02c088f732c38d67890673e2bae905ba0dee206beb6f32949b891b7030e01ea8dab9e29e1f96ea25b78ec45bd95bbd209f5f89907d3aa1ae8053de4c0aacf183ab3359eef6db90569273d72b016fb1cd23be45526e9d86254c9c5a3884085b105397830bd4c276f09595ac78ecc7ca7465e26d3c0c6e80b96796f0470170009c437a85d477f3c710fede25e78ea6a2a802c2b435d2c9b62724b422154cf02500995cc17d31cc265eb3cc84659ee7fd6aba1db8eec47911fa160c071556f0fd91425129fcc344078162cac4fda0e150557116724f4bece2c8bef0737e98aefb116c694f29830124f4a2f8f87919b42b756257f9f603397e53a499e32b783fe67657ea20b474faa358b430cecd2450685567dc50f15efe48e72471ca2ac4f7e54c8110898138e2e6396cde295c0824ff27a902f843e920c0edd85cb836c77d7134663330f145ac4fb1c36094"}) r4 = creat(0x0, 0x40) ioctl$FICLONE(r4, 0x40049409, r3) 13:30:23 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:30:23 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:30:23 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = mmap$IORING_OFF_SQES(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x13, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r1, 0x0, 0x0) r2 = timerfd_create(0x1, 0x80800) fallocate(r2, 0x1, 0x4000000000000000, 0x7fffffff) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) [ 1756.401050] FAULT_INJECTION: forcing a failure. [ 1756.401050] name failslab, interval 1, probability 0, space 0, times 0 [ 1756.403909] CPU: 1 PID: 11483 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1756.405317] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1756.407009] Call Trace: [ 1756.407563] dump_stack+0x107/0x167 [ 1756.408314] should_fail.cold+0x5/0xa [ 1756.409087] ? alloc_trace_kprobe+0x58/0x510 [ 1756.409989] should_failslab+0x5/0x20 [ 1756.410757] __kmalloc+0x72/0x390 [ 1756.411495] alloc_trace_kprobe+0x58/0x510 [ 1756.412354] ? __startup_64+0x9/0x3b0 [ 1756.413119] ? __startup_64+0x9/0x3b0 [ 1756.413899] ? lock_acquire+0x197/0x470 [ 1756.414712] ? __startup_64+0x9/0x3b0 [ 1756.415492] ? __startup_64+0x9/0x3b0 [ 1756.416271] create_local_trace_kprobe+0x4c/0x3b0 [ 1756.417266] perf_kprobe_init+0x18c/0x280 [ 1756.418141] perf_kprobe_event_init+0xf8/0x1c0 [ 1756.419085] perf_try_init_event+0x130/0x570 [ 1756.419993] perf_event_alloc.part.0+0xd96/0x2b70 [ 1756.420989] __do_sys_perf_event_open+0x580/0x2d50 [ 1756.421998] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1756.422991] ? perf_event_set_output+0x5b0/0x5b0 [ 1756.423959] ? wait_for_completion_io+0x270/0x270 [ 1756.424971] ? __startup_64+0x9/0x3b0 [ 1756.425762] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1756.426824] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1756.427891] do_syscall_64+0x33/0x40 [ 1756.428646] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1756.429687] RIP: 0033:0x7f6eb84dfb19 [ 1756.430442] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1756.434186] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1756.435751] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1756.437192] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1756.438646] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1756.440120] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1756.441581] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 [ 1756.443145] trace_kprobe: Failed to allocate trace_probe.(-12) 13:30:23 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:30:23 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000220000000000002200"/120, 0x78, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1756.563799] Process accounting paused [ 1756.587676] ISOFS: Logical zone size(0) < hardware blocksize(1024) 13:30:24 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x400000001ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:30:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) 13:30:24 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380)=0x0, {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x10400, 0x0) r4 = accept4(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000180)=0x80, 0x0) sendfile(r3, r4, &(0x7f00000001c0)=0x3, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x40) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x100000001) r7 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) r8 = open(&(0x7f0000001740)='./file0\x00', 0x200080, 0x141) sendmsg$nl_generic(r8, &(0x7f0000001ac0)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001a80)={&(0x7f00000017c0)={0x2c0, 0x30, 0x10, 0x70bd2d, 0x25dfdbfc, {0x1c}, [@typed={0x8, 0x4a, 0x0, 0x0, @uid=0xee00}, @generic="de839cbf2cf5c7630629dff10c27ad9ce0b8a448e1fb6eed0eb0ba90c9e0bf9b60cfaaf4c560ca4dee8f21c50982291d58e427d206ca7e44b84ccff648c8f5fbe540a7bbc08a12c6996dca745ec65d406bfe74f6da4fbdac08f3af437783641ed15cc49d0fe1b5c49356f4b8d725e728690017a905e147ff71a152234042ee40dfa338e3de0a8514d963775208a03f11d3f44ce141e0b9071907a38468247fef23bb55a57fb3127134dc57ddcf7fdbd14b979b9276042faec3367b65ab5f66ce2ed4a5ba08ea71891b93fcdeb482c7a99a", @generic="391ab75fda31a91bcde9deb8b68cc8423cd8458a49872299cdde3587e2a232ab52a66c849e129d5581bf1d5c384fdb1376e7af72276c63cd6d4f092cdc4eacc00613238dc3d7f46b871f2425df8394c126e8b00cfb742f071e330fc386cc075d99a68841746b7ca9199f9a99fa85e07daa2a0e5157234d98465774a6e9f50ed7", @typed={0x8, 0x7a, 0x0, 0x0, @pid=r1}, @nested={0x145, 0x85, 0x0, 0x1, [@typed={0x8, 0x41, 0x0, 0x0, @ipv4=@remote}, @typed={0x66, 0x73, 0x0, 0x0, @binary="52cc64cc54f8b9dd9a97a2a6addea39dc87720b109c02c3c263aacedaac60551a69fe059f5adc1e71cb28a2cbc72c017a594b1a2ab5f10efd0f22c33d49d5217600f230817ab347521d835fd4af58e281613b29785239180c9bd589895df0404aecc"}, @generic="e39f6fde8a902db741f50546b236f87bfbb7f93b7d50ff998d25512eef2c02c58e7a5f901068726c6ce2235fc85d9d8fee226e7936e7ef7008b650ab613b4f43151c72e755ad8e081b1cc620985a4957bf4d1a9d22eac0b20ba4487b2efdf4d06fc909d670c5cf87afc44e52e928522986b43bccf70dc663c7d618542dd4431d02ae49931f9e5e7d4ba85ffefe1b9fa77d37d760baaff59b69ea328777b1ef40383efbb49b7dc8a13249142dc250ddf98455572db9747811673cd5e60e492b2bb11d14fcaa57cef800e91664be147f1dac"]}]}, 0x2c0}, 0x1, 0x0, 0x0, 0x20000005}, 0x20000840) sendfile(r5, r7, 0x0, 0x80000001) clone3(&(0x7f00000016c0)={0x800, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0), {0x2b}, &(0x7f0000000600)=""/87, 0x57, &(0x7f0000000680)=""/4096, &(0x7f0000001680)=[r2], 0x1, {r7}}, 0x58) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfdef) 13:30:24 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 5) [ 1756.796170] FAULT_INJECTION: forcing a failure. [ 1756.796170] name failslab, interval 1, probability 0, space 0, times 0 [ 1756.798594] CPU: 1 PID: 11505 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1756.800006] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1756.801683] Call Trace: [ 1756.802228] dump_stack+0x107/0x167 [ 1756.802996] should_fail.cold+0x5/0xa [ 1756.803771] ? create_object.isra.0+0x3a/0xa20 [ 1756.804717] should_failslab+0x5/0x20 [ 1756.805492] kmem_cache_alloc+0x5b/0x310 [ 1756.806326] create_object.isra.0+0x3a/0xa20 [ 1756.807238] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1756.808280] __kmalloc+0x16e/0x390 [ 1756.808995] alloc_trace_kprobe+0x58/0x510 [ 1756.809843] ? __startup_64+0x9/0x3b0 [ 1756.810591] ? __startup_64+0x9/0x3b0 [ 1756.811393] ? lock_acquire+0x197/0x470 [ 1756.812187] ? __startup_64+0x9/0x3b0 [ 1756.812978] ? __startup_64+0x9/0x3b0 [ 1756.813756] create_local_trace_kprobe+0x4c/0x3b0 [ 1756.814743] perf_kprobe_init+0x18c/0x280 [ 1756.815621] perf_kprobe_event_init+0xf8/0x1c0 [ 1756.816554] perf_try_init_event+0x130/0x570 [ 1756.817449] perf_event_alloc.part.0+0xd96/0x2b70 [ 1756.818444] __do_sys_perf_event_open+0x580/0x2d50 [ 1756.819477] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1756.820471] ? perf_event_set_output+0x5b0/0x5b0 [ 1756.821443] ? wait_for_completion_io+0x270/0x270 [ 1756.822431] ? __startup_64+0x9/0x3b0 [ 1756.823240] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1756.824326] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1756.825391] do_syscall_64+0x33/0x40 [ 1756.826151] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1756.827209] RIP: 0033:0x7f6eb84dfb19 [ 1756.827970] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1756.831761] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1756.833320] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1756.834779] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1756.836245] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1756.837704] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1756.839183] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 13:30:38 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:30:38 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:30:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380)=0x0, {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x10400, 0x0) r4 = accept4(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000180)=0x80, 0x0) sendfile(r3, r4, &(0x7f00000001c0)=0x3, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x40) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x100000001) r7 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) r8 = open(&(0x7f0000001740)='./file0\x00', 0x200080, 0x141) sendmsg$nl_generic(r8, &(0x7f0000001ac0)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001a80)={&(0x7f00000017c0)={0x2c0, 0x30, 0x10, 0x70bd2d, 0x25dfdbfc, {0x1c}, [@typed={0x8, 0x4a, 0x0, 0x0, @uid=0xee00}, @generic="de839cbf2cf5c7630629dff10c27ad9ce0b8a448e1fb6eed0eb0ba90c9e0bf9b60cfaaf4c560ca4dee8f21c50982291d58e427d206ca7e44b84ccff648c8f5fbe540a7bbc08a12c6996dca745ec65d406bfe74f6da4fbdac08f3af437783641ed15cc49d0fe1b5c49356f4b8d725e728690017a905e147ff71a152234042ee40dfa338e3de0a8514d963775208a03f11d3f44ce141e0b9071907a38468247fef23bb55a57fb3127134dc57ddcf7fdbd14b979b9276042faec3367b65ab5f66ce2ed4a5ba08ea71891b93fcdeb482c7a99a", @generic="391ab75fda31a91bcde9deb8b68cc8423cd8458a49872299cdde3587e2a232ab52a66c849e129d5581bf1d5c384fdb1376e7af72276c63cd6d4f092cdc4eacc00613238dc3d7f46b871f2425df8394c126e8b00cfb742f071e330fc386cc075d99a68841746b7ca9199f9a99fa85e07daa2a0e5157234d98465774a6e9f50ed7", @typed={0x8, 0x7a, 0x0, 0x0, @pid=r1}, @nested={0x145, 0x85, 0x0, 0x1, [@typed={0x8, 0x41, 0x0, 0x0, @ipv4=@remote}, @typed={0x66, 0x73, 0x0, 0x0, @binary="52cc64cc54f8b9dd9a97a2a6addea39dc87720b109c02c3c263aacedaac60551a69fe059f5adc1e71cb28a2cbc72c017a594b1a2ab5f10efd0f22c33d49d5217600f230817ab347521d835fd4af58e281613b29785239180c9bd589895df0404aecc"}, @generic="e39f6fde8a902db741f50546b236f87bfbb7f93b7d50ff998d25512eef2c02c58e7a5f901068726c6ce2235fc85d9d8fee226e7936e7ef7008b650ab613b4f43151c72e755ad8e081b1cc620985a4957bf4d1a9d22eac0b20ba4487b2efdf4d06fc909d670c5cf87afc44e52e928522986b43bccf70dc663c7d618542dd4431d02ae49931f9e5e7d4ba85ffefe1b9fa77d37d760baaff59b69ea328777b1ef40383efbb49b7dc8a13249142dc250ddf98455572db9747811673cd5e60e492b2bb11d14fcaa57cef800e91664be147f1dac"]}]}, 0x2c0}, 0x1, 0x0, 0x0, 0x20000005}, 0x20000840) sendfile(r5, r7, 0x0, 0x80000001) clone3(&(0x7f00000016c0)={0x800, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0), {0x2b}, &(0x7f0000000600)=""/87, 0x57, &(0x7f0000000680)=""/4096, &(0x7f0000001680)=[r2], 0x1, {r7}}, 0x58) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfdef) 13:30:38 executing program 5: ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x4) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:30:38 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000220000000000002200"/120, 0x78, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:30:38 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000", 0x15}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:30:38 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) 13:30:38 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 6) 13:30:39 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) [ 1771.598994] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 1771.628802] FAT-fs (loop7): invalid media value (0x00) [ 1771.630143] FAT-fs (loop7): Can't find a valid FAT filesystem 13:30:39 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000220000000000002200000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018", 0x8c, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1771.652811] FAULT_INJECTION: forcing a failure. [ 1771.652811] name failslab, interval 1, probability 0, space 0, times 0 [ 1771.655435] CPU: 1 PID: 11530 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1771.656992] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1771.658861] Call Trace: [ 1771.659473] dump_stack+0x107/0x167 [ 1771.660296] should_fail.cold+0x5/0xa [ 1771.661154] ? create_object.isra.0+0x3a/0xa20 [ 1771.662184] should_failslab+0x5/0x20 [ 1771.663041] kmem_cache_alloc+0x5b/0x310 [ 1771.663984] create_object.isra.0+0x3a/0xa20 [ 1771.664984] kmemleak_alloc_percpu+0xa0/0x100 [ 1771.666003] pcpu_alloc+0x4e2/0x1240 [ 1771.666869] alloc_trace_kprobe+0x78/0x510 [ 1771.667831] ? __startup_64+0x9/0x3b0 [ 1771.668691] ? __startup_64+0x9/0x3b0 [ 1771.669553] ? lock_acquire+0x197/0x470 [ 1771.670451] ? __startup_64+0x9/0x3b0 [ 1771.671312] ? __startup_64+0x9/0x3b0 [ 1771.672171] create_local_trace_kprobe+0x4c/0x3b0 [ 1771.673274] perf_kprobe_init+0x18c/0x280 [ 1771.674217] perf_kprobe_event_init+0xf8/0x1c0 [ 1771.675270] perf_try_init_event+0x130/0x570 [ 1771.676275] perf_event_alloc.part.0+0xd96/0x2b70 [ 1771.677380] __do_sys_perf_event_open+0x580/0x2d50 [ 1771.678506] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1771.679603] ? perf_event_set_output+0x5b0/0x5b0 [ 1771.680667] ? wait_for_completion_io+0x270/0x270 [ 1771.681769] ? __startup_64+0x9/0x3b0 [ 1771.682643] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1771.683835] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1771.685006] do_syscall_64+0x33/0x40 [ 1771.685860] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1771.687015] RIP: 0033:0x7f6eb84dfb19 [ 1771.687877] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1771.692018] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1771.693745] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1771.695364] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1771.696979] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1771.698586] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1771.700213] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 [ 1771.814691] isofs_fill_super: get root inode failed 13:30:39 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:30:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) 13:30:39 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 7) 13:30:39 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000140)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x21a) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) sendfile(r1, r3, 0x0, 0x80000001) ioctl$BLKTRACESTOP(r3, 0x1275, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r3, 0xf504, 0x0) 13:30:39 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000220000000000002200000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018", 0x8c, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1771.945726] FAULT_INJECTION: forcing a failure. [ 1771.945726] name failslab, interval 1, probability 0, space 0, times 0 [ 1771.948221] CPU: 1 PID: 11550 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1771.949711] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1771.951463] Call Trace: [ 1771.952005] dump_stack+0x107/0x167 [ 1771.952747] should_fail.cold+0x5/0xa [ 1771.953598] ? create_object.isra.0+0x3a/0xa20 [ 1771.954650] should_failslab+0x5/0x20 [ 1771.955508] kmem_cache_alloc+0x5b/0x310 [ 1771.956363] create_object.isra.0+0x3a/0xa20 [ 1771.957267] kmemleak_alloc_percpu+0xa0/0x100 [ 1771.958307] pcpu_alloc+0x4e2/0x1240 [ 1771.959102] alloc_trace_kprobe+0x78/0x510 [ 1771.960070] ? __startup_64+0x9/0x3b0 [ 1771.960901] ? __startup_64+0x9/0x3b0 [ 1771.961790] ? lock_acquire+0x197/0x470 [ 1771.962638] ? __startup_64+0x9/0x3b0 [ 1771.963509] ? __startup_64+0x9/0x3b0 [ 1771.964324] create_local_trace_kprobe+0x4c/0x3b0 [ 1771.965401] perf_kprobe_init+0x18c/0x280 [ 1771.966279] perf_kprobe_event_init+0xf8/0x1c0 [ 1771.967350] perf_try_init_event+0x130/0x570 [ 1771.968306] perf_event_alloc.part.0+0xd96/0x2b70 [ 1771.969384] __do_sys_perf_event_open+0x580/0x2d50 [ 1771.970527] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1771.971641] ? perf_event_set_output+0x5b0/0x5b0 [ 1771.972709] ? wait_for_completion_io+0x270/0x270 [ 1771.973787] ? __startup_64+0x9/0x3b0 [ 1771.974670] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1771.975824] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1771.976993] do_syscall_64+0x33/0x40 [ 1771.977836] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1771.978935] RIP: 0033:0x7f6eb84dfb19 [ 1771.979789] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1771.983969] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1771.985682] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1771.987283] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1771.988949] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1771.990481] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1771.992051] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 [ 1772.057961] isofs_fill_super: get root inode failed 13:30:39 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000", 0x15}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 1772.187796] FAT-fs (loop7): invalid media value (0x00) [ 1772.189169] FAT-fs (loop7): Can't find a valid FAT filesystem 13:30:55 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000220000000000002200000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018", 0x8c, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:30:55 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:30:55 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000100), 0x6, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0xfffe, 0x8, 0x7, 0x4000000}) syz_open_dev$sg(&(0x7f0000000000), 0xfffffffffffffc01, 0x600000) r2 = open_tree(r1, &(0x7f0000000140)='./file0\x00', 0x800) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f0000000180)) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:30:55 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000", 0x15}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:30:55 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 8) 13:30:55 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380)=0x0, {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x10400, 0x0) r4 = accept4(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000180)=0x80, 0x0) sendfile(r3, r4, &(0x7f00000001c0)=0x3, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x40) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x100000001) r7 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) r8 = open(&(0x7f0000001740)='./file0\x00', 0x200080, 0x141) sendmsg$nl_generic(r8, &(0x7f0000001ac0)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001a80)={&(0x7f00000017c0)={0x2c0, 0x30, 0x10, 0x70bd2d, 0x25dfdbfc, {0x1c}, [@typed={0x8, 0x4a, 0x0, 0x0, @uid=0xee00}, @generic="de839cbf2cf5c7630629dff10c27ad9ce0b8a448e1fb6eed0eb0ba90c9e0bf9b60cfaaf4c560ca4dee8f21c50982291d58e427d206ca7e44b84ccff648c8f5fbe540a7bbc08a12c6996dca745ec65d406bfe74f6da4fbdac08f3af437783641ed15cc49d0fe1b5c49356f4b8d725e728690017a905e147ff71a152234042ee40dfa338e3de0a8514d963775208a03f11d3f44ce141e0b9071907a38468247fef23bb55a57fb3127134dc57ddcf7fdbd14b979b9276042faec3367b65ab5f66ce2ed4a5ba08ea71891b93fcdeb482c7a99a", @generic="391ab75fda31a91bcde9deb8b68cc8423cd8458a49872299cdde3587e2a232ab52a66c849e129d5581bf1d5c384fdb1376e7af72276c63cd6d4f092cdc4eacc00613238dc3d7f46b871f2425df8394c126e8b00cfb742f071e330fc386cc075d99a68841746b7ca9199f9a99fa85e07daa2a0e5157234d98465774a6e9f50ed7", @typed={0x8, 0x7a, 0x0, 0x0, @pid=r1}, @nested={0x145, 0x85, 0x0, 0x1, [@typed={0x8, 0x41, 0x0, 0x0, @ipv4=@remote}, @typed={0x66, 0x73, 0x0, 0x0, @binary="52cc64cc54f8b9dd9a97a2a6addea39dc87720b109c02c3c263aacedaac60551a69fe059f5adc1e71cb28a2cbc72c017a594b1a2ab5f10efd0f22c33d49d5217600f230817ab347521d835fd4af58e281613b29785239180c9bd589895df0404aecc"}, @generic="e39f6fde8a902db741f50546b236f87bfbb7f93b7d50ff998d25512eef2c02c58e7a5f901068726c6ce2235fc85d9d8fee226e7936e7ef7008b650ab613b4f43151c72e755ad8e081b1cc620985a4957bf4d1a9d22eac0b20ba4487b2efdf4d06fc909d670c5cf87afc44e52e928522986b43bccf70dc663c7d618542dd4431d02ae49931f9e5e7d4ba85ffefe1b9fa77d37d760baaff59b69ea328777b1ef40383efbb49b7dc8a13249142dc250ddf98455572db9747811673cd5e60e492b2bb11d14fcaa57cef800e91664be147f1dac"]}]}, 0x2c0}, 0x1, 0x0, 0x0, 0x20000005}, 0x20000840) sendfile(r5, r7, 0x0, 0x80000001) clone3(&(0x7f00000016c0)={0x800, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0), {0x2b}, &(0x7f0000000600)=""/87, 0x57, &(0x7f0000000680)=""/4096, &(0x7f0000001680)=[r2], 0x1, {r7}}, 0x58) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfdef) 13:30:55 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:30:55 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0x86) [ 1787.921440] FAULT_INJECTION: forcing a failure. [ 1787.921440] name failslab, interval 1, probability 0, space 0, times 0 [ 1787.924005] CPU: 1 PID: 11574 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1787.924026] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1787.924031] Call Trace: [ 1787.924056] dump_stack+0x107/0x167 [ 1787.924082] should_fail.cold+0x5/0xa [ 1787.924104] ? trace_probe_init+0x6a/0x4e0 [ 1787.924124] should_failslab+0x5/0x20 [ 1787.924139] __kmalloc+0x72/0x390 [ 1787.924165] trace_probe_init+0x6a/0x4e0 [ 1787.924188] alloc_trace_kprobe+0x2ce/0x510 [ 1787.924203] ? __startup_64+0x9/0x3b0 [ 1787.924216] ? __startup_64+0x9/0x3b0 [ 1787.924235] ? __startup_64+0x9/0x3b0 [ 1787.924248] ? __startup_64+0x9/0x3b0 [ 1787.924264] create_local_trace_kprobe+0x4c/0x3b0 [ 1787.924288] perf_kprobe_init+0x18c/0x280 [ 1787.924312] perf_kprobe_event_init+0xf8/0x1c0 [ 1787.924332] perf_try_init_event+0x130/0x570 [ 1787.924357] perf_event_alloc.part.0+0xd96/0x2b70 [ 1787.924388] __do_sys_perf_event_open+0x580/0x2d50 [ 1787.924417] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1787.924437] ? perf_event_set_output+0x5b0/0x5b0 [ 1787.924451] ? wait_for_completion_io+0x270/0x270 [ 1787.924478] ? __startup_64+0x9/0x3b0 [ 1787.924508] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1787.924529] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1787.924552] do_syscall_64+0x33/0x40 [ 1787.924571] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1787.924583] RIP: 0033:0x7f6eb84dfb19 [ 1787.924600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1787.924609] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1787.924629] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1787.924639] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1787.924649] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1787.924659] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1787.924669] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 [ 1787.924780] trace_kprobe: Failed to allocate trace_probe.(-12) [ 1787.941442] FAT-fs (loop7): invalid media value (0x00) [ 1787.954340] isofs_fill_super: get root inode failed [ 1787.955215] FAT-fs (loop7): Can't find a valid FAT filesystem 13:30:55 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x86) 13:30:55 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 9) 13:30:55 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) [ 1788.117717] Process accounting resumed [ 1788.128698] FAULT_INJECTION: forcing a failure. [ 1788.128698] name failslab, interval 1, probability 0, space 0, times 0 [ 1788.130959] CPU: 1 PID: 11591 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1788.132344] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1788.134002] Call Trace: [ 1788.134537] dump_stack+0x107/0x167 [ 1788.135274] should_fail.cold+0x5/0xa [ 1788.136073] ? create_object.isra.0+0x3a/0xa20 [ 1788.136991] should_failslab+0x5/0x20 [ 1788.137753] kmem_cache_alloc+0x5b/0x310 [ 1788.138571] create_object.isra.0+0x3a/0xa20 [ 1788.139454] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1788.140464] __kmalloc+0x16e/0x390 [ 1788.141183] trace_probe_init+0x6a/0x4e0 [ 1788.142008] alloc_trace_kprobe+0x2ce/0x510 [ 1788.142863] ? __startup_64+0x9/0x3b0 [ 1788.143638] ? __startup_64+0x9/0x3b0 13:30:55 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) stat(&(0x7f00000000c0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) chown(&(0x7f00000001c0)='./file1\x00', r1, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x6, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="f83385a812eb090e90f6c50cb7e82cb4a3cf0dbc24536bad2f56ec2adee0f8ae0617b37399fe3b0b904dec9fde5863a376c402af9524e60f36b994a1b7afe3fa9719a90d0e8e0569c759268f5deb7d415a36f4d2b6e990fd8dab44", 0x5b, 0x2}, {&(0x7f0000000300)="ffc1dc56f34efa32d567f76df3dc8db50c24c5f09958f8bd6d796c8698833d978205cf1e94f1e03826083c478eb034633e8314338782c68adb460e5e53184e02e046ae59dde0d80ce026a42072374997041d8d62c729c6bbcf0bc6f58e42efa36d0746448be7fd494bc8aa6c98cc5157f71c489f932cf91ba33068ee46b96f420a06854234e0eaba48ab33ba8e92e0e94a3d31a8249cf082115b1192ac2d7a76eda1b1c93bdda66c6eb8a73854dd66cf79645d9b54ac2238b547dc006aa15685656bd6a1c56d76b8611fcdcf1d83cf3e", 0xd0, 0x4}], 0x1040400, &(0x7f0000000400)={[{@dioread_nolock}, {@nodiscard}, {@data_ordered}, {@journal_path={'journal_path', 0x3d, './file1'}}, {@nouid32}, {@dioread_lock}], [{@seclabel}, {@pcr={'pcr', 0x3d, 0x24}}, {@uid_gt={'uid>', r1}}, {@obj_type={'obj_type', 0x3d, ' -{&#\x1a'}}, {@smackfsdef={'smackfsdef', 0x3d, '/\xf8'}}]}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) sendfile(r2, r4, 0x0, 0x80000001) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) [ 1788.144396] ? __startup_64+0x9/0x3b0 [ 1788.145320] ? __startup_64+0x9/0x3b0 [ 1788.146085] create_local_trace_kprobe+0x4c/0x3b0 [ 1788.147066] perf_kprobe_init+0x18c/0x280 [ 1788.147926] perf_kprobe_event_init+0xf8/0x1c0 [ 1788.148851] perf_try_init_event+0x130/0x570 [ 1788.149748] perf_event_alloc.part.0+0xd96/0x2b70 [ 1788.150736] __do_sys_perf_event_open+0x580/0x2d50 [ 1788.151754] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1788.152723] ? perf_event_set_output+0x5b0/0x5b0 [ 1788.153670] ? wait_for_completion_io+0x270/0x270 [ 1788.154656] ? __startup_64+0x9/0x3b0 [ 1788.155453] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1788.156508] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1788.157552] do_syscall_64+0x33/0x40 [ 1788.158304] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1788.159339] RIP: 0033:0x7f6eb84dfb19 [ 1788.160092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1788.163796] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1788.165328] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1788.166762] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1788.168212] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1788.169641] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1788.171076] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 13:30:55 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000", 0x96, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1788.396147] isofs_fill_super: get root inode failed 13:31:09 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:31:09 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:31:09 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380)=0x0, {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x10400, 0x0) r4 = accept4(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000180)=0x80, 0x0) sendfile(r3, r4, &(0x7f00000001c0)=0x3, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x40) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x100000001) r7 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) r8 = open(&(0x7f0000001740)='./file0\x00', 0x200080, 0x141) sendmsg$nl_generic(r8, &(0x7f0000001ac0)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001a80)={&(0x7f00000017c0)={0x2c0, 0x30, 0x10, 0x70bd2d, 0x25dfdbfc, {0x1c}, [@typed={0x8, 0x4a, 0x0, 0x0, @uid=0xee00}, @generic="de839cbf2cf5c7630629dff10c27ad9ce0b8a448e1fb6eed0eb0ba90c9e0bf9b60cfaaf4c560ca4dee8f21c50982291d58e427d206ca7e44b84ccff648c8f5fbe540a7bbc08a12c6996dca745ec65d406bfe74f6da4fbdac08f3af437783641ed15cc49d0fe1b5c49356f4b8d725e728690017a905e147ff71a152234042ee40dfa338e3de0a8514d963775208a03f11d3f44ce141e0b9071907a38468247fef23bb55a57fb3127134dc57ddcf7fdbd14b979b9276042faec3367b65ab5f66ce2ed4a5ba08ea71891b93fcdeb482c7a99a", @generic="391ab75fda31a91bcde9deb8b68cc8423cd8458a49872299cdde3587e2a232ab52a66c849e129d5581bf1d5c384fdb1376e7af72276c63cd6d4f092cdc4eacc00613238dc3d7f46b871f2425df8394c126e8b00cfb742f071e330fc386cc075d99a68841746b7ca9199f9a99fa85e07daa2a0e5157234d98465774a6e9f50ed7", @typed={0x8, 0x7a, 0x0, 0x0, @pid=r1}, @nested={0x145, 0x85, 0x0, 0x1, [@typed={0x8, 0x41, 0x0, 0x0, @ipv4=@remote}, @typed={0x66, 0x73, 0x0, 0x0, @binary="52cc64cc54f8b9dd9a97a2a6addea39dc87720b109c02c3c263aacedaac60551a69fe059f5adc1e71cb28a2cbc72c017a594b1a2ab5f10efd0f22c33d49d5217600f230817ab347521d835fd4af58e281613b29785239180c9bd589895df0404aecc"}, @generic="e39f6fde8a902db741f50546b236f87bfbb7f93b7d50ff998d25512eef2c02c58e7a5f901068726c6ce2235fc85d9d8fee226e7936e7ef7008b650ab613b4f43151c72e755ad8e081b1cc620985a4957bf4d1a9d22eac0b20ba4487b2efdf4d06fc909d670c5cf87afc44e52e928522986b43bccf70dc663c7d618542dd4431d02ae49931f9e5e7d4ba85ffefe1b9fa77d37d760baaff59b69ea328777b1ef40383efbb49b7dc8a13249142dc250ddf98455572db9747811673cd5e60e492b2bb11d14fcaa57cef800e91664be147f1dac"]}]}, 0x2c0}, 0x1, 0x0, 0x0, 0x20000005}, 0x20000840) sendfile(r5, r7, 0x0, 0x80000001) clone3(&(0x7f00000016c0)={0x800, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0), {0x2b}, &(0x7f0000000600)=""/87, 0x57, &(0x7f0000000680)=""/4096, &(0x7f0000001680)=[r2], 0x1, {r7}}, 0x58) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfdef) 13:31:09 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 1802.575602] FAT-fs (loop7): bogus number of FAT sectors [ 1802.577014] FAT-fs (loop7): Can't find a valid FAT filesystem 13:31:09 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r2 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x4) r6 = accept$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) ioctl$EXT4_IOC_MIGRATE(r5, 0x6609) sendfile(r6, r5, 0x0, 0x20d315) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000002c0)=ANY=[@ANYBLOB="9bdc3fbc03000000000000000200000000000089ae97dfcf7b306144987800040000008085b4fb8cd6b1a9144549f70d1d53f8edbec2eae78b7e6294e33d77351167361590d7ded57989d493ad3031a6c8b6048784", @ANYRES32=r2, @ANYBLOB="00000000ff7f00000000000000c00000000000000000000074310000", @ANYRES32=r3, @ANYBLOB="000000007f00"/28, @ANYRES32=r0, @ANYBLOB="000000000100"/28, @ANYRES32=r0, @ANYBLOB="000000000100"/28]) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r4}, './file1\x00'}) ioctl$sock_inet6_tcp_SIOCINQ(r7, 0x541b, &(0x7f00000001c0)) 13:31:09 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 10) 13:31:09 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000", 0x96, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:31:09 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) [ 1802.625913] FAULT_INJECTION: forcing a failure. [ 1802.625913] name failslab, interval 1, probability 0, space 0, times 0 [ 1802.628542] CPU: 1 PID: 11616 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1802.630006] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1802.631779] Call Trace: [ 1802.632349] dump_stack+0x107/0x167 [ 1802.633130] should_fail.cold+0x5/0xa [ 1802.633950] should_failslab+0x5/0x20 [ 1802.634780] __kmalloc_track_caller+0x79/0x370 [ 1802.635763] ? trace_probe_init+0x227/0x4e0 [ 1802.636725] kstrdup+0x36/0x70 [ 1802.637396] trace_probe_init+0x227/0x4e0 [ 1802.638306] alloc_trace_kprobe+0x2ce/0x510 [ 1802.639248] ? __startup_64+0x9/0x3b0 [ 1802.640063] ? __startup_64+0x9/0x3b0 [ 1802.640855] ? __startup_64+0x9/0x3b0 [ 1802.641644] ? __startup_64+0x9/0x3b0 [ 1802.642489] create_local_trace_kprobe+0x4c/0x3b0 [ 1802.643583] perf_kprobe_init+0x18c/0x280 [ 1802.644482] perf_kprobe_event_init+0xf8/0x1c0 [ 1802.645469] perf_try_init_event+0x130/0x570 [ 1802.646459] perf_event_alloc.part.0+0xd96/0x2b70 [ 1802.647521] __do_sys_perf_event_open+0x580/0x2d50 [ 1802.648575] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1802.649620] ? perf_event_set_output+0x5b0/0x5b0 [ 1802.650641] ? wait_for_completion_io+0x270/0x270 [ 1802.651708] ? __startup_64+0x9/0x3b0 [ 1802.652537] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1802.653634] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1802.654739] do_syscall_64+0x33/0x40 [ 1802.655540] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1802.656684] RIP: 0033:0x7f6eb84dfb19 [ 1802.657498] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1802.661403] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1802.663019] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1802.664571] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1802.666162] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1802.667782] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1802.669397] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 [ 1802.671187] trace_kprobe: Failed to allocate trace_probe.(-12) [ 1802.701833] isofs_fill_super: get root inode failed 13:31:10 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:31:10 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:31:10 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000", 0x96, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:31:10 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 11) [ 1802.903077] FAULT_INJECTION: forcing a failure. [ 1802.903077] name failslab, interval 1, probability 0, space 0, times 0 [ 1802.905978] CPU: 1 PID: 11635 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1802.907469] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1802.909274] Call Trace: [ 1802.909849] dump_stack+0x107/0x167 [ 1802.910648] should_fail.cold+0x5/0xa [ 1802.911473] ? create_object.isra.0+0x3a/0xa20 [ 1802.912479] should_failslab+0x5/0x20 [ 1802.913294] kmem_cache_alloc+0x5b/0x310 [ 1802.914165] ? lock_downgrade+0x6d0/0x6d0 [ 1802.915058] create_object.isra.0+0x3a/0xa20 [ 1802.916011] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1802.917105] __kmalloc_track_caller+0x177/0x370 [ 1802.918103] ? trace_probe_init+0x227/0x4e0 [ 1802.919037] kstrdup+0x36/0x70 [ 1802.919756] trace_probe_init+0x227/0x4e0 [ 1802.920656] alloc_trace_kprobe+0x2ce/0x510 [ 1802.921578] ? __startup_64+0x9/0x3b0 [ 1802.922389] ? __startup_64+0x9/0x3b0 [ 1802.923208] ? __startup_64+0x9/0x3b0 [ 1802.924029] ? __startup_64+0x9/0x3b0 [ 1802.924843] create_local_trace_kprobe+0x4c/0x3b0 [ 1802.925885] perf_kprobe_init+0x18c/0x280 [ 1802.926789] perf_kprobe_event_init+0xf8/0x1c0 [ 1802.927789] perf_try_init_event+0x130/0x570 [ 1802.928740] perf_event_alloc.part.0+0xd96/0x2b70 [ 1802.929789] __do_sys_perf_event_open+0x580/0x2d50 [ 1802.930857] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1802.931909] ? perf_event_set_output+0x5b0/0x5b0 [ 1802.932927] ? wait_for_completion_io+0x270/0x270 [ 1802.933973] ? __startup_64+0x9/0x3b0 [ 1802.934808] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1802.935951] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1802.937075] do_syscall_64+0x33/0x40 [ 1802.937877] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1802.938985] RIP: 0033:0x7f6eb84dfb19 [ 1802.939801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1802.943754] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1802.945401] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1802.946929] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1802.948466] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1802.950011] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1802.951564] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 [ 1803.000043] isofs_fill_super: get root inode failed 13:31:10 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:31:10 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:31:10 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:31:10 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:31:10 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000220000000000002200000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018130000000000000000000015000000", 0x9b, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:31:10 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 12) [ 1803.184737] FAT-fs (loop7): bogus number of FAT sectors [ 1803.186059] FAT-fs (loop7): Can't find a valid FAT filesystem [ 1803.263183] isofs_fill_super: get root inode failed [ 1803.300736] FAULT_INJECTION: forcing a failure. [ 1803.300736] name failslab, interval 1, probability 0, space 0, times 0 [ 1803.303446] CPU: 1 PID: 11654 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1803.304996] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1803.306852] Call Trace: [ 1803.307448] dump_stack+0x107/0x167 [ 1803.308287] should_fail.cold+0x5/0xa [ 1803.309172] should_failslab+0x5/0x20 [ 1803.310058] __kmalloc_track_caller+0x79/0x370 [ 1803.311104] ? trace_probe_init+0x284/0x4e0 [ 1803.312075] kstrdup+0x36/0x70 [ 1803.312788] trace_probe_init+0x284/0x4e0 [ 1803.313726] alloc_trace_kprobe+0x2ce/0x510 [ 1803.314683] ? __startup_64+0x9/0x3b0 [ 1803.315541] ? __startup_64+0x9/0x3b0 [ 1803.316384] ? __startup_64+0x9/0x3b0 [ 1803.317232] ? __startup_64+0x9/0x3b0 [ 1803.318095] create_local_trace_kprobe+0x4c/0x3b0 [ 1803.319188] perf_kprobe_init+0x18c/0x280 [ 1803.320140] perf_kprobe_event_init+0xf8/0x1c0 [ 1803.321156] perf_try_init_event+0x130/0x570 [ 1803.322157] perf_event_alloc.part.0+0xd96/0x2b70 [ 1803.323259] __do_sys_perf_event_open+0x580/0x2d50 [ 1803.324377] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1803.325470] ? perf_event_set_output+0x5b0/0x5b0 [ 1803.326525] ? wait_for_completion_io+0x270/0x270 [ 1803.327636] ? __startup_64+0x9/0x3b0 [ 1803.328507] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1803.329685] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1803.330820] do_syscall_64+0x33/0x40 [ 1803.331648] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1803.332755] RIP: 0033:0x7f6eb84dfb19 [ 1803.333562] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1803.337543] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1803.339177] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1803.340716] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1803.342246] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1803.343786] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1803.345327] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 [ 1803.347054] trace_kprobe: Failed to allocate trace_probe.(-12) 13:31:26 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:31:26 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:31:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) sendfile(r0, r2, 0x0, 0x80000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) recvmsg$unix(r2, &(0x7f0000000240)={&(0x7f0000000180), 0x6e, &(0x7f0000000680)=[{&(0x7f0000000300)=""/151, 0x97}, {&(0x7f00000003c0)=""/206, 0xce}, {&(0x7f00000004c0)=""/246, 0xf6}, {&(0x7f0000000200)=""/32, 0x20}, {&(0x7f00000005c0)=""/140, 0x8c}], 0x5, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}, 0x10111) r5 = getegid() keyctl$chown(0x4, 0x0, 0xee01, r5) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000140)={{}, {0x1, 0x1}, [{0x2, 0x3, 0xffffffffffffffff}, {0x2, 0x4, 0xee01}, {0x2, 0x2, 0xffffffffffffffff}], {0x4, 0x6}, [{}, {0x8, 0x4, r5}, {0x8, 0x1}], {0x10, 0x2}, {0x20, 0x7}}, 0x54, 0x2) fchown(0xffffffffffffffff, r4, r5) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r3, r6, 0x0, 0x20d315) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r6) r7 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r7, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r7, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:31:26 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000220000000000002200000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018130000000000000000000015000000", 0x9b, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:31:26 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b0"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:31:26 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:31:26 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 13) 13:31:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380)=0x0, {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x10400, 0x0) r4 = accept4(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000180)=0x80, 0x0) sendfile(r3, r4, &(0x7f00000001c0)=0x3, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x40) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x100000001) r7 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) r8 = open(&(0x7f0000001740)='./file0\x00', 0x200080, 0x141) sendmsg$nl_generic(r8, &(0x7f0000001ac0)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001a80)={&(0x7f00000017c0)={0x2c0, 0x30, 0x10, 0x70bd2d, 0x25dfdbfc, {0x1c}, [@typed={0x8, 0x4a, 0x0, 0x0, @uid=0xee00}, @generic="de839cbf2cf5c7630629dff10c27ad9ce0b8a448e1fb6eed0eb0ba90c9e0bf9b60cfaaf4c560ca4dee8f21c50982291d58e427d206ca7e44b84ccff648c8f5fbe540a7bbc08a12c6996dca745ec65d406bfe74f6da4fbdac08f3af437783641ed15cc49d0fe1b5c49356f4b8d725e728690017a905e147ff71a152234042ee40dfa338e3de0a8514d963775208a03f11d3f44ce141e0b9071907a38468247fef23bb55a57fb3127134dc57ddcf7fdbd14b979b9276042faec3367b65ab5f66ce2ed4a5ba08ea71891b93fcdeb482c7a99a", @generic="391ab75fda31a91bcde9deb8b68cc8423cd8458a49872299cdde3587e2a232ab52a66c849e129d5581bf1d5c384fdb1376e7af72276c63cd6d4f092cdc4eacc00613238dc3d7f46b871f2425df8394c126e8b00cfb742f071e330fc386cc075d99a68841746b7ca9199f9a99fa85e07daa2a0e5157234d98465774a6e9f50ed7", @typed={0x8, 0x7a, 0x0, 0x0, @pid=r1}, @nested={0x145, 0x85, 0x0, 0x1, [@typed={0x8, 0x41, 0x0, 0x0, @ipv4=@remote}, @typed={0x66, 0x73, 0x0, 0x0, @binary="52cc64cc54f8b9dd9a97a2a6addea39dc87720b109c02c3c263aacedaac60551a69fe059f5adc1e71cb28a2cbc72c017a594b1a2ab5f10efd0f22c33d49d5217600f230817ab347521d835fd4af58e281613b29785239180c9bd589895df0404aecc"}, @generic="e39f6fde8a902db741f50546b236f87bfbb7f93b7d50ff998d25512eef2c02c58e7a5f901068726c6ce2235fc85d9d8fee226e7936e7ef7008b650ab613b4f43151c72e755ad8e081b1cc620985a4957bf4d1a9d22eac0b20ba4487b2efdf4d06fc909d670c5cf87afc44e52e928522986b43bccf70dc663c7d618542dd4431d02ae49931f9e5e7d4ba85ffefe1b9fa77d37d760baaff59b69ea328777b1ef40383efbb49b7dc8a13249142dc250ddf98455572db9747811673cd5e60e492b2bb11d14fcaa57cef800e91664be147f1dac"]}]}, 0x2c0}, 0x1, 0x0, 0x0, 0x20000005}, 0x20000840) sendfile(r5, r7, 0x0, 0x80000001) clone3(&(0x7f00000016c0)={0x800, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0), {0x2b}, &(0x7f0000000600)=""/87, 0x57, &(0x7f0000000680)=""/4096, &(0x7f0000001680)=[r2], 0x1, {r7}}, 0x58) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) [ 1819.284327] FAULT_INJECTION: forcing a failure. [ 1819.284327] name failslab, interval 1, probability 0, space 0, times 0 [ 1819.286848] CPU: 1 PID: 11671 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1819.288254] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1819.289912] Call Trace: [ 1819.290454] dump_stack+0x107/0x167 [ 1819.291210] should_fail.cold+0x5/0xa [ 1819.292006] ? create_object.isra.0+0x3a/0xa20 [ 1819.292964] should_failslab+0x5/0x20 [ 1819.293737] kmem_cache_alloc+0x5b/0x310 [ 1819.294573] create_object.isra.0+0x3a/0xa20 [ 1819.295472] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1819.296525] __kmalloc_track_caller+0x177/0x370 [ 1819.297472] ? trace_probe_init+0x284/0x4e0 [ 1819.298359] kstrdup+0x36/0x70 [ 1819.299017] trace_probe_init+0x284/0x4e0 [ 1819.299870] alloc_trace_kprobe+0x2ce/0x510 [ 1819.300747] ? __startup_64+0x9/0x3b0 [ 1819.301515] ? __startup_64+0x9/0x3b0 [ 1819.302297] ? __startup_64+0x9/0x3b0 [ 1819.303067] ? __startup_64+0x9/0x3b0 [ 1819.303854] create_local_trace_kprobe+0x4c/0x3b0 [ 1819.304843] perf_kprobe_init+0x18c/0x280 [ 1819.305698] perf_kprobe_event_init+0xf8/0x1c0 [ 1819.306631] perf_try_init_event+0x130/0x570 [ 1819.307539] perf_event_alloc.part.0+0xd96/0x2b70 [ 1819.308557] __do_sys_perf_event_open+0x580/0x2d50 [ 1819.309579] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1819.310574] ? perf_event_set_output+0x5b0/0x5b0 [ 1819.311548] ? wait_for_completion_io+0x270/0x270 [ 1819.312546] ? __startup_64+0x9/0x3b0 [ 1819.313338] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1819.314416] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1819.315469] do_syscall_64+0x33/0x40 [ 1819.316242] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1819.317292] RIP: 0033:0x7f6eb84dfb19 [ 1819.318058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1819.321827] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1819.323374] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1819.324851] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1819.326304] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1819.327776] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1819.329204] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 [ 1819.336405] FAT-fs (loop7): bogus number of FAT sectors [ 1819.337736] FAT-fs (loop7): Can't find a valid FAT filesystem [ 1819.359555] isofs_fill_super: get root inode failed 13:31:26 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:31:26 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000220000000000002200000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018130000000000000000000015000000", 0x9b, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:31:26 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) [ 1819.594323] isofs_fill_super: get root inode failed 13:31:27 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:31:27 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002200000000000022000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181300000000000000000000150000000022", 0x9d, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:31:27 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 14) 13:31:27 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:31:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) [ 1819.791647] FAULT_INJECTION: forcing a failure. [ 1819.791647] name failslab, interval 1, probability 0, space 0, times 0 [ 1819.792949] CPU: 1 PID: 11704 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1819.793712] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1819.794600] Call Trace: [ 1819.794891] dump_stack+0x107/0x167 [ 1819.795285] should_fail.cold+0x5/0xa [ 1819.795702] ? traceprobe_set_print_fmt+0x5a/0xd0 [ 1819.796263] should_failslab+0x5/0x20 [ 1819.796689] __kmalloc+0x72/0x390 [ 1819.797068] traceprobe_set_print_fmt+0x5a/0xd0 [ 1819.797596] create_local_trace_kprobe+0x1ca/0x3b0 [ 1819.798123] perf_kprobe_init+0x18c/0x280 [ 1819.798593] perf_kprobe_event_init+0xf8/0x1c0 [ 1819.799080] perf_try_init_event+0x130/0x570 [ 1819.799576] perf_event_alloc.part.0+0xd96/0x2b70 [ 1819.800105] __do_sys_perf_event_open+0x580/0x2d50 [ 1819.800653] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1819.801169] ? perf_event_set_output+0x5b0/0x5b0 [ 1819.801695] ? wait_for_completion_io+0x270/0x270 [ 1819.802214] ? __startup_64+0x9/0x3b0 [ 1819.802653] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1819.803222] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1819.803809] do_syscall_64+0x33/0x40 [ 1819.804211] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1819.804777] RIP: 0033:0x7f6eb84dfb19 [ 1819.805177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1819.807204] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1819.808036] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1819.808824] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1819.809629] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1819.810414] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1819.811188] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 13:31:27 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002200000000000022000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181300000000000000000000150000000022", 0x9d, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:31:27 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380)=0x0, {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x10400, 0x0) r4 = accept4(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000180)=0x80, 0x0) sendfile(r3, r4, &(0x7f00000001c0)=0x3, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x40) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x100000001) r7 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) r8 = open(&(0x7f0000001740)='./file0\x00', 0x200080, 0x141) sendmsg$nl_generic(r8, &(0x7f0000001ac0)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001a80)={&(0x7f00000017c0)={0x2c0, 0x30, 0x10, 0x70bd2d, 0x25dfdbfc, {0x1c}, [@typed={0x8, 0x4a, 0x0, 0x0, @uid=0xee00}, @generic="de839cbf2cf5c7630629dff10c27ad9ce0b8a448e1fb6eed0eb0ba90c9e0bf9b60cfaaf4c560ca4dee8f21c50982291d58e427d206ca7e44b84ccff648c8f5fbe540a7bbc08a12c6996dca745ec65d406bfe74f6da4fbdac08f3af437783641ed15cc49d0fe1b5c49356f4b8d725e728690017a905e147ff71a152234042ee40dfa338e3de0a8514d963775208a03f11d3f44ce141e0b9071907a38468247fef23bb55a57fb3127134dc57ddcf7fdbd14b979b9276042faec3367b65ab5f66ce2ed4a5ba08ea71891b93fcdeb482c7a99a", @generic="391ab75fda31a91bcde9deb8b68cc8423cd8458a49872299cdde3587e2a232ab52a66c849e129d5581bf1d5c384fdb1376e7af72276c63cd6d4f092cdc4eacc00613238dc3d7f46b871f2425df8394c126e8b00cfb742f071e330fc386cc075d99a68841746b7ca9199f9a99fa85e07daa2a0e5157234d98465774a6e9f50ed7", @typed={0x8, 0x7a, 0x0, 0x0, @pid=r1}, @nested={0x145, 0x85, 0x0, 0x1, [@typed={0x8, 0x41, 0x0, 0x0, @ipv4=@remote}, @typed={0x66, 0x73, 0x0, 0x0, @binary="52cc64cc54f8b9dd9a97a2a6addea39dc87720b109c02c3c263aacedaac60551a69fe059f5adc1e71cb28a2cbc72c017a594b1a2ab5f10efd0f22c33d49d5217600f230817ab347521d835fd4af58e281613b29785239180c9bd589895df0404aecc"}, @generic="e39f6fde8a902db741f50546b236f87bfbb7f93b7d50ff998d25512eef2c02c58e7a5f901068726c6ce2235fc85d9d8fee226e7936e7ef7008b650ab613b4f43151c72e755ad8e081b1cc620985a4957bf4d1a9d22eac0b20ba4487b2efdf4d06fc909d670c5cf87afc44e52e928522986b43bccf70dc663c7d618542dd4431d02ae49931f9e5e7d4ba85ffefe1b9fa77d37d760baaff59b69ea328777b1ef40383efbb49b7dc8a13249142dc250ddf98455572db9747811673cd5e60e492b2bb11d14fcaa57cef800e91664be147f1dac"]}]}, 0x2c0}, 0x1, 0x0, 0x0, 0x20000005}, 0x20000840) sendfile(r5, r7, 0x0, 0x80000001) clone3(&(0x7f00000016c0)={0x800, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0), {0x2b}, &(0x7f0000000600)=""/87, 0x57, &(0x7f0000000680)=""/4096, &(0x7f0000001680)=[r2], 0x1, {r7}}, 0x58) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) [ 1819.960864] isofs_fill_super: get root inode failed [ 1819.970152] Process accounting paused 13:31:27 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 15) [ 1819.990685] FAULT_INJECTION: forcing a failure. [ 1819.990685] name failslab, interval 1, probability 0, space 0, times 0 [ 1819.991956] CPU: 1 PID: 11713 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1819.992715] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1819.993615] Call Trace: [ 1819.993906] dump_stack+0x107/0x167 [ 1819.994300] should_fail.cold+0x5/0xa [ 1819.994727] ? traceprobe_set_print_fmt+0x5a/0xd0 [ 1819.995243] should_failslab+0x5/0x20 [ 1819.995670] __kmalloc+0x72/0x390 [ 1819.996055] traceprobe_set_print_fmt+0x5a/0xd0 [ 1819.996568] create_local_trace_kprobe+0x1ca/0x3b0 [ 1819.997095] perf_kprobe_init+0x18c/0x280 [ 1819.997564] perf_kprobe_event_init+0xf8/0x1c0 [ 1819.998055] perf_try_init_event+0x130/0x570 [ 1819.998547] perf_event_alloc.part.0+0xd96/0x2b70 [ 1819.999073] __do_sys_perf_event_open+0x580/0x2d50 [ 1819.999617] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1820.000148] ? perf_event_set_output+0x5b0/0x5b0 [ 1820.000668] ? wait_for_completion_io+0x270/0x270 [ 1820.001190] ? __startup_64+0x9/0x3b0 [ 1820.001639] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1820.002201] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1820.002785] do_syscall_64+0x33/0x40 [ 1820.003184] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1820.003770] RIP: 0033:0x7f6eb84dfb19 [ 1820.004169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1820.006235] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1820.007055] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1820.007842] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1820.008638] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1820.009413] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1820.010190] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 13:31:44 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:31:44 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380)=0x0, {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x10400, 0x0) r4 = accept4(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000180)=0x80, 0x0) sendfile(r3, r4, &(0x7f00000001c0)=0x3, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x40) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x100000001) r7 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) r8 = open(&(0x7f0000001740)='./file0\x00', 0x200080, 0x141) sendmsg$nl_generic(r8, &(0x7f0000001ac0)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001a80)={&(0x7f00000017c0)={0x2c0, 0x30, 0x10, 0x70bd2d, 0x25dfdbfc, {0x1c}, [@typed={0x8, 0x4a, 0x0, 0x0, @uid=0xee00}, @generic="de839cbf2cf5c7630629dff10c27ad9ce0b8a448e1fb6eed0eb0ba90c9e0bf9b60cfaaf4c560ca4dee8f21c50982291d58e427d206ca7e44b84ccff648c8f5fbe540a7bbc08a12c6996dca745ec65d406bfe74f6da4fbdac08f3af437783641ed15cc49d0fe1b5c49356f4b8d725e728690017a905e147ff71a152234042ee40dfa338e3de0a8514d963775208a03f11d3f44ce141e0b9071907a38468247fef23bb55a57fb3127134dc57ddcf7fdbd14b979b9276042faec3367b65ab5f66ce2ed4a5ba08ea71891b93fcdeb482c7a99a", @generic="391ab75fda31a91bcde9deb8b68cc8423cd8458a49872299cdde3587e2a232ab52a66c849e129d5581bf1d5c384fdb1376e7af72276c63cd6d4f092cdc4eacc00613238dc3d7f46b871f2425df8394c126e8b00cfb742f071e330fc386cc075d99a68841746b7ca9199f9a99fa85e07daa2a0e5157234d98465774a6e9f50ed7", @typed={0x8, 0x7a, 0x0, 0x0, @pid=r1}, @nested={0x145, 0x85, 0x0, 0x1, [@typed={0x8, 0x41, 0x0, 0x0, @ipv4=@remote}, @typed={0x66, 0x73, 0x0, 0x0, @binary="52cc64cc54f8b9dd9a97a2a6addea39dc87720b109c02c3c263aacedaac60551a69fe059f5adc1e71cb28a2cbc72c017a594b1a2ab5f10efd0f22c33d49d5217600f230817ab347521d835fd4af58e281613b29785239180c9bd589895df0404aecc"}, @generic="e39f6fde8a902db741f50546b236f87bfbb7f93b7d50ff998d25512eef2c02c58e7a5f901068726c6ce2235fc85d9d8fee226e7936e7ef7008b650ab613b4f43151c72e755ad8e081b1cc620985a4957bf4d1a9d22eac0b20ba4487b2efdf4d06fc909d670c5cf87afc44e52e928522986b43bccf70dc663c7d618542dd4431d02ae49931f9e5e7d4ba85ffefe1b9fa77d37d760baaff59b69ea328777b1ef40383efbb49b7dc8a13249142dc250ddf98455572db9747811673cd5e60e492b2bb11d14fcaa57cef800e91664be147f1dac"]}]}, 0x2c0}, 0x1, 0x0, 0x0, 0x20000005}, 0x20000840) sendfile(r5, r7, 0x0, 0x80000001) clone3(&(0x7f00000016c0)={0x800, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0), {0x2b}, &(0x7f0000000600)=""/87, 0x57, &(0x7f0000000680)=""/4096, &(0x7f0000001680)=[r2], 0x1, {r7}}, 0x58) 13:31:44 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b0"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:31:44 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x4, 0x5) r2 = syz_open_dev$vcsn(&(0x7f0000002580), 0xff, 0x123100) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f00000025c0)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e21, @multicast2}, 0x10, 0x0, 0x0, 0x0, 0xdd0, 0x0, 0x9, 0x3, 0xfff}) r3 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) poll(&(0x7f0000000140)=[{r0, 0x6a7}, {r0, 0x4100}, {r0, 0x2011}, {r1, 0x1000}, {r3, 0x410}, {r4, 0x501}, {r0, 0x100}, {r0, 0x2c0}, {r0, 0x4000}, {r0, 0x234}], 0xa, 0x20) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x100000001) setsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000200)={0x2, 0x0, 0xff, 0x1, 0xc2, 0x4, 0x4}, 0xc) r7 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x12d000, 0x108) sendfile(r5, r7, 0x0, 0x80000001) ioctl$SG_GET_RESERVED_SIZE(r7, 0x2272, &(0x7f0000000000)) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x50) readv(0xffffffffffffffff, 0x0, 0x0) 13:31:44 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002200000000000022000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181300000000000000000000150000000022", 0x9d, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:31:44 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:31:44 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 16) 13:31:44 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) [ 1836.986431] isofs_fill_super: get root inode failed [ 1836.992269] blktrace: Concurrent blktraces are not allowed on sg0 [ 1836.996742] FAULT_INJECTION: forcing a failure. [ 1836.996742] name failslab, interval 1, probability 0, space 0, times 0 [ 1836.999501] CPU: 1 PID: 11731 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1837.000928] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1837.002626] Call Trace: [ 1837.003173] dump_stack+0x107/0x167 [ 1837.003922] should_fail.cold+0x5/0xa [ 1837.004718] ? alloc_aggr_kprobe+0x41/0x190 [ 1837.005597] should_failslab+0x5/0x20 [ 1837.006372] kmem_cache_alloc_trace+0x55/0x320 [ 1837.007308] alloc_aggr_kprobe+0x41/0x190 [ 1837.008159] register_kprobe+0xbfa/0x13d0 [ 1837.009001] ? __startup_64+0x9/0x3b0 [ 1837.009782] __register_trace_kprobe+0x26a/0x2d0 [ 1837.010742] create_local_trace_kprobe+0x1e6/0x3b0 [ 1837.011759] perf_kprobe_init+0x18c/0x280 [ 1837.012619] perf_kprobe_event_init+0xf8/0x1c0 [ 1837.013553] perf_try_init_event+0x130/0x570 [ 1837.014456] perf_event_alloc.part.0+0xd96/0x2b70 [ 1837.015483] __do_sys_perf_event_open+0x580/0x2d50 [ 1837.016505] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1837.017508] ? perf_event_set_output+0x5b0/0x5b0 [ 1837.018462] ? wait_for_completion_io+0x270/0x270 [ 1837.019465] ? __startup_64+0x9/0x3b0 [ 1837.020262] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1837.021340] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1837.022392] do_syscall_64+0x33/0x40 [ 1837.023156] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1837.024210] RIP: 0033:0x7f6eb84dfb19 [ 1837.024978] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1837.028688] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1837.030253] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1837.031684] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1837.033127] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1837.034565] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1837.036020] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 13:31:44 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000220000000000002200000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018130000000000000000000015000000002200", 0x9e, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:31:44 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) [ 1837.252705] isofs_fill_super: get root inode failed 13:32:01 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b0"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:32:01 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) openat2(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', &(0x7f0000000100)={0x880800, 0x141}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) sendfile(r2, r0, 0x0, 0x8) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) [ 1854.597849] isofs_fill_super: get root inode failed 13:32:01 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000220000000000002200000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018130000000000000000000015000000002200", 0x9e, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:32:01 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x86) 13:32:01 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 17) 13:32:01 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:32:01 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:32:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x10400, 0x0) r3 = accept4(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000180)=0x80, 0x0) sendfile(r2, r3, &(0x7f00000001c0)=0x3, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x40) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) r6 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) r7 = open(&(0x7f0000001740)='./file0\x00', 0x200080, 0x141) sendmsg$nl_generic(r7, &(0x7f0000001ac0)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001a80)={&(0x7f00000017c0)={0x2c0, 0x30, 0x10, 0x70bd2d, 0x25dfdbfc, {0x1c}, [@typed={0x8, 0x4a, 0x0, 0x0, @uid=0xee00}, @generic="de839cbf2cf5c7630629dff10c27ad9ce0b8a448e1fb6eed0eb0ba90c9e0bf9b60cfaaf4c560ca4dee8f21c50982291d58e427d206ca7e44b84ccff648c8f5fbe540a7bbc08a12c6996dca745ec65d406bfe74f6da4fbdac08f3af437783641ed15cc49d0fe1b5c49356f4b8d725e728690017a905e147ff71a152234042ee40dfa338e3de0a8514d963775208a03f11d3f44ce141e0b9071907a38468247fef23bb55a57fb3127134dc57ddcf7fdbd14b979b9276042faec3367b65ab5f66ce2ed4a5ba08ea71891b93fcdeb482c7a99a", @generic="391ab75fda31a91bcde9deb8b68cc8423cd8458a49872299cdde3587e2a232ab52a66c849e129d5581bf1d5c384fdb1376e7af72276c63cd6d4f092cdc4eacc00613238dc3d7f46b871f2425df8394c126e8b00cfb742f071e330fc386cc075d99a68841746b7ca9199f9a99fa85e07daa2a0e5157234d98465774a6e9f50ed7", @typed={0x8, 0x7a, 0x0, 0x0, @pid=r1}, @nested={0x145, 0x85, 0x0, 0x1, [@typed={0x8, 0x41, 0x0, 0x0, @ipv4=@remote}, @typed={0x66, 0x73, 0x0, 0x0, @binary="52cc64cc54f8b9dd9a97a2a6addea39dc87720b109c02c3c263aacedaac60551a69fe059f5adc1e71cb28a2cbc72c017a594b1a2ab5f10efd0f22c33d49d5217600f230817ab347521d835fd4af58e281613b29785239180c9bd589895df0404aecc"}, @generic="e39f6fde8a902db741f50546b236f87bfbb7f93b7d50ff998d25512eef2c02c58e7a5f901068726c6ce2235fc85d9d8fee226e7936e7ef7008b650ab613b4f43151c72e755ad8e081b1cc620985a4957bf4d1a9d22eac0b20ba4487b2efdf4d06fc909d670c5cf87afc44e52e928522986b43bccf70dc663c7d618542dd4431d02ae49931f9e5e7d4ba85ffefe1b9fa77d37d760baaff59b69ea328777b1ef40383efbb49b7dc8a13249142dc250ddf98455572db9747811673cd5e60e492b2bb11d14fcaa57cef800e91664be147f1dac"]}]}, 0x2c0}, 0x1, 0x0, 0x0, 0x20000005}, 0x20000840) sendfile(r4, r6, 0x0, 0x80000001) [ 1854.680918] FAULT_INJECTION: forcing a failure. [ 1854.680918] name failslab, interval 1, probability 0, space 0, times 0 [ 1854.683640] CPU: 1 PID: 11776 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1854.685199] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1854.687049] Call Trace: [ 1854.687643] dump_stack+0x107/0x167 [ 1854.688471] should_fail.cold+0x5/0xa [ 1854.689324] ? create_object.isra.0+0x3a/0xa20 [ 1854.690346] should_failslab+0x5/0x20 [ 1854.691188] kmem_cache_alloc+0x5b/0x310 [ 1854.692084] ? mutex_lock_io_nested+0xf30/0xf30 [ 1854.693135] create_object.isra.0+0x3a/0xa20 [ 1854.694114] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1854.695244] kmem_cache_alloc_trace+0x151/0x320 [ 1854.696309] alloc_aggr_kprobe+0x41/0x190 [ 1854.697228] register_kprobe+0xbfa/0x13d0 [ 1854.698153] ? __startup_64+0x9/0x3b0 [ 1854.699010] __register_trace_kprobe+0x26a/0x2d0 [ 1854.700068] create_local_trace_kprobe+0x1e6/0x3b0 [ 1854.701177] perf_kprobe_init+0x18c/0x280 [ 1854.702115] perf_kprobe_event_init+0xf8/0x1c0 [ 1854.703130] perf_try_init_event+0x130/0x570 [ 1854.704117] perf_event_alloc.part.0+0xd96/0x2b70 [ 1854.705209] __do_sys_perf_event_open+0x580/0x2d50 [ 1854.706311] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1854.707384] ? perf_event_set_output+0x5b0/0x5b0 [ 1854.708436] ? wait_for_completion_io+0x270/0x270 [ 1854.709525] ? __startup_64+0x9/0x3b0 [ 1854.710392] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1854.711562] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1854.712730] do_syscall_64+0x33/0x40 [ 1854.713564] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1854.714720] RIP: 0033:0x7f6eb84dfb19 [ 1854.715562] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1854.719637] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1854.721359] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1854.722929] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1854.724515] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1854.726316] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1854.728094] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 13:32:02 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000220000000000002200000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018130000000000000000000015000000002200", 0x9e, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:32:02 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 18) 13:32:02 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x86) [ 1854.823046] isofs_fill_super: get root inode failed [ 1854.834749] FAULT_INJECTION: forcing a failure. [ 1854.834749] name failslab, interval 1, probability 0, space 0, times 0 [ 1854.838077] CPU: 1 PID: 11790 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1854.839613] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1854.841485] Call Trace: [ 1854.842224] dump_stack+0x107/0x167 [ 1854.843072] should_fail.cold+0x5/0xa [ 1854.843999] ? create_object.isra.0+0x3a/0xa20 [ 1854.845052] should_failslab+0x5/0x20 [ 1854.845897] kmem_cache_alloc+0x5b/0x310 [ 1854.846808] create_object.isra.0+0x3a/0xa20 [ 1854.847793] kmemleak_alloc_percpu+0xa0/0x100 [ 1854.848808] pcpu_alloc+0x4e2/0x1240 [ 1854.849744] perf_trace_event_init+0x376/0x9c0 [ 1854.850845] perf_kprobe_init+0x1c5/0x280 [ 1854.851845] perf_kprobe_event_init+0xf8/0x1c0 [ 1854.852942] perf_try_init_event+0x130/0x570 [ 1854.853997] perf_event_alloc.part.0+0xd96/0x2b70 [ 1854.855223] __do_sys_perf_event_open+0x580/0x2d50 [ 1854.856392] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1854.857516] ? perf_event_set_output+0x5b0/0x5b0 [ 1854.858555] ? wait_for_completion_io+0x270/0x270 [ 1854.859637] ? __startup_64+0x9/0x3b0 [ 1854.860522] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1854.861795] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1854.863053] do_syscall_64+0x33/0x40 [ 1854.863951] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1854.865155] RIP: 0033:0x7f6eb84dfb19 [ 1854.865984] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1854.870274] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1854.872025] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1854.873615] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1854.875192] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1854.876937] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1854.878603] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 13:32:02 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 19) 13:32:02 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:32:02 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1855.002887] FAULT_INJECTION: forcing a failure. [ 1855.002887] name failslab, interval 1, probability 0, space 0, times 0 [ 1855.005784] CPU: 1 PID: 11794 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1855.007474] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1855.009447] Call Trace: [ 1855.010060] dump_stack+0x107/0x167 [ 1855.010897] should_fail.cold+0x5/0xa [ 1855.011825] ? create_object.isra.0+0x3a/0xa20 [ 1855.012999] should_failslab+0x5/0x20 [ 1855.013870] kmem_cache_alloc+0x5b/0x310 [ 1855.014805] ? mark_held_locks+0x9e/0xe0 [ 1855.015743] create_object.isra.0+0x3a/0xa20 [ 1855.016783] kmemleak_alloc_percpu+0xa0/0x100 [ 1855.017822] pcpu_alloc+0x4e2/0x1240 [ 1855.018715] perf_trace_event_init+0x376/0x9c0 [ 1855.019789] perf_kprobe_init+0x1c5/0x280 [ 1855.020781] perf_kprobe_event_init+0xf8/0x1c0 [ 1855.021850] perf_try_init_event+0x130/0x570 [ 1855.022887] perf_event_alloc.part.0+0xd96/0x2b70 [ 1855.024040] __do_sys_perf_event_open+0x580/0x2d50 [ 1855.025213] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1855.026352] ? perf_event_set_output+0x5b0/0x5b0 [ 1855.027337] ? wait_for_completion_io+0x270/0x270 [ 1855.028321] ? __startup_64+0x9/0x3b0 [ 1855.029104] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1855.030144] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1855.031182] do_syscall_64+0x33/0x40 [ 1855.031935] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1855.032962] RIP: 0033:0x7f6eb84dfb19 [ 1855.033710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1855.037358] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1855.038881] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1855.040317] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1855.041759] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1855.043172] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1855.044624] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 [ 1855.074531] Process accounting resumed 13:32:02 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x86) 13:32:02 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x407, 0x7, 0xfffffffffffffffc}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) [ 1855.197612] blktrace: Concurrent blktraces are not allowed on sg0 [ 1874.119831] FAULT_INJECTION: forcing a failure. [ 1874.119831] name failslab, interval 1, probability 0, space 0, times 0 [ 1874.122156] CPU: 1 PID: 11818 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1874.123542] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1874.125212] Call Trace: [ 1874.125745] dump_stack+0x107/0x167 [ 1874.126482] should_fail.cold+0x5/0xa [ 1874.127249] ? selinux_perf_event_alloc+0x43/0x190 [ 1874.128232] should_failslab+0x5/0x20 [ 1874.129020] kmem_cache_alloc_trace+0x55/0x320 [ 1874.129932] ? perf_kprobe_init+0x1f9/0x280 [ 1874.130816] selinux_perf_event_alloc+0x43/0x190 [ 1874.131767] security_perf_event_alloc+0x46/0xa0 [ 1874.132726] perf_event_alloc.part.0+0x18b3/0x2b70 [ 1874.133718] __do_sys_perf_event_open+0x580/0x2d50 [ 1874.134714] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1874.135683] ? perf_event_set_output+0x5b0/0x5b0 [ 1874.136643] ? wait_for_completion_io+0x270/0x270 [ 1874.137623] ? __startup_64+0x9/0x3b0 [ 1874.138402] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1874.139465] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1874.140511] do_syscall_64+0x33/0x40 [ 1874.141255] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1874.142275] RIP: 0033:0x7f6eb84dfb19 [ 1874.143017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1874.146710] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1874.148255] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1874.149686] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1874.151109] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1874.152543] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1874.153966] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 13:32:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:32:21 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001280)={0x0, 0xfffffffffffffffe, 0x1000, 0xff, @buffer={0x0, 0xcd, &(0x7f0000000100)=""/205}, &(0x7f0000000200)="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", &(0x7f0000001200)=""/79, 0x494, 0x10001, 0x3}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) fallocate(r0, 0x18, 0x1ff, 0x2) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001640)={0x0, 0xfffffffffffffffc, 0x50, 0x9, @scatter={0x2, 0x0, &(0x7f00000014c0)=[{&(0x7f0000001300)=""/244, 0xf4}, {&(0x7f0000001400)=""/141, 0x8d}]}, &(0x7f0000001500)="00658036eb9f09fc02f22caee64a3709cf55ab4d3065d55c2a42a8c8d2a2b886840a1937e2db8fe45fed9b006bc7f983d1225dcddbf22afc29a4c80ce173e68fdd383d7f4aed6658d8d03b060505a60f", &(0x7f0000001580)=""/96, 0x9, 0x0, 0x0, &(0x7f0000001600)}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 13:32:21 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa4"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:32:21 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:32:21 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:32:21 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 20) 13:32:21 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:32:21 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x10400, 0x0) r3 = accept4(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000180)=0x80, 0x0) sendfile(r2, r3, &(0x7f00000001c0)=0x3, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x40) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) r6 = open(&(0x7f0000001740)='./file0\x00', 0x200080, 0x141) sendmsg$nl_generic(r6, &(0x7f0000001ac0)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001a80)={&(0x7f00000017c0)={0x2c0, 0x30, 0x10, 0x70bd2d, 0x25dfdbfc, {0x1c}, [@typed={0x8, 0x4a, 0x0, 0x0, @uid=0xee00}, @generic="de839cbf2cf5c7630629dff10c27ad9ce0b8a448e1fb6eed0eb0ba90c9e0bf9b60cfaaf4c560ca4dee8f21c50982291d58e427d206ca7e44b84ccff648c8f5fbe540a7bbc08a12c6996dca745ec65d406bfe74f6da4fbdac08f3af437783641ed15cc49d0fe1b5c49356f4b8d725e728690017a905e147ff71a152234042ee40dfa338e3de0a8514d963775208a03f11d3f44ce141e0b9071907a38468247fef23bb55a57fb3127134dc57ddcf7fdbd14b979b9276042faec3367b65ab5f66ce2ed4a5ba08ea71891b93fcdeb482c7a99a", @generic="391ab75fda31a91bcde9deb8b68cc8423cd8458a49872299cdde3587e2a232ab52a66c849e129d5581bf1d5c384fdb1376e7af72276c63cd6d4f092cdc4eacc00613238dc3d7f46b871f2425df8394c126e8b00cfb742f071e330fc386cc075d99a68841746b7ca9199f9a99fa85e07daa2a0e5157234d98465774a6e9f50ed7", @typed={0x8, 0x7a, 0x0, 0x0, @pid=r1}, @nested={0x145, 0x85, 0x0, 0x1, [@typed={0x8, 0x41, 0x0, 0x0, @ipv4=@remote}, @typed={0x66, 0x73, 0x0, 0x0, @binary="52cc64cc54f8b9dd9a97a2a6addea39dc87720b109c02c3c263aacedaac60551a69fe059f5adc1e71cb28a2cbc72c017a594b1a2ab5f10efd0f22c33d49d5217600f230817ab347521d835fd4af58e281613b29785239180c9bd589895df0404aecc"}, @generic="e39f6fde8a902db741f50546b236f87bfbb7f93b7d50ff998d25512eef2c02c58e7a5f901068726c6ce2235fc85d9d8fee226e7936e7ef7008b650ab613b4f43151c72e755ad8e081b1cc620985a4957bf4d1a9d22eac0b20ba4487b2efdf4d06fc909d670c5cf87afc44e52e928522986b43bccf70dc663c7d618542dd4431d02ae49931f9e5e7d4ba85ffefe1b9fa77d37d760baaff59b69ea328777b1ef40383efbb49b7dc8a13249142dc250ddf98455572db9747811673cd5e60e492b2bb11d14fcaa57cef800e91664be147f1dac"]}]}, 0x2c0}, 0x1, 0x0, 0x0, 0x20000005}, 0x20000840) [ 1874.180455] ISOFS: Unable to identify CD-ROM format. 13:32:21 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 21) 13:32:21 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}, {@map_off}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1874.267628] FAULT_INJECTION: forcing a failure. [ 1874.267628] name failslab, interval 1, probability 0, space 0, times 0 [ 1874.270172] CPU: 1 PID: 11831 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1874.271623] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1874.273379] Call Trace: [ 1874.274001] dump_stack+0x107/0x167 [ 1874.274913] should_fail.cold+0x5/0xa [ 1874.275722] ? selinux_perf_event_alloc+0x43/0x190 [ 1874.276792] should_failslab+0x5/0x20 [ 1874.277568] kmem_cache_alloc_trace+0x55/0x320 [ 1874.278563] ? perf_kprobe_init+0x1f9/0x280 [ 1874.279434] selinux_perf_event_alloc+0x43/0x190 [ 1874.280383] security_perf_event_alloc+0x46/0xa0 [ 1874.281346] perf_event_alloc.part.0+0x18b3/0x2b70 [ 1874.282337] __do_sys_perf_event_open+0x580/0x2d50 [ 1874.283348] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1874.284317] ? perf_event_set_output+0x5b0/0x5b0 [ 1874.285284] ? wait_for_completion_io+0x270/0x270 [ 1874.286261] ? __startup_64+0x9/0x3b0 [ 1874.287036] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1874.288084] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1874.289132] do_syscall_64+0x33/0x40 [ 1874.289876] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1874.290903] RIP: 0033:0x7f6eb84dfb19 [ 1874.291652] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1874.295308] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1874.296832] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1874.298255] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1874.299683] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1874.301114] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1874.302534] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 13:32:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) [ 1874.331785] ISOFS: Unable to identify CD-ROM format. 13:32:21 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:32:21 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 22) 13:32:21 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:32:21 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa4"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:32:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:32:22 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) [ 1874.597537] FAULT_INJECTION: forcing a failure. [ 1874.597537] name failslab, interval 1, probability 0, space 0, times 0 [ 1874.599888] CPU: 1 PID: 11845 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1874.601303] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1874.602969] Call Trace: [ 1874.603513] dump_stack+0x107/0x167 [ 1874.604269] should_fail.cold+0x5/0xa [ 1874.605054] ? find_get_context+0x18d/0x9a0 [ 1874.605921] should_failslab+0x5/0x20 [ 1874.606692] kmem_cache_alloc_trace+0x55/0x320 [ 1874.607628] find_get_context+0x18d/0x9a0 [ 1874.608468] ? security_perf_event_alloc+0x79/0xa0 [ 1874.609462] ? ctx_sched_out+0xa00/0xa00 [ 1874.610301] __do_sys_perf_event_open+0xed5/0x2d50 [ 1874.611303] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1874.612290] ? perf_event_set_output+0x5b0/0x5b0 [ 1874.613258] ? wait_for_completion_io+0x270/0x270 [ 1874.614237] ? __startup_64+0x9/0x3b0 [ 1874.615016] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1874.616072] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1874.617121] do_syscall_64+0x33/0x40 [ 1874.617876] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1874.618905] RIP: 0033:0x7f6eb84dfb19 [ 1874.619653] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1874.623383] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1874.624951] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1874.626405] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1874.627846] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1874.629306] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1874.630740] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 13:32:22 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x10400, 0x0) r3 = accept4(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000180)=0x80, 0x0) sendfile(r2, r3, &(0x7f00000001c0)=0x3, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x40) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) r6 = open(&(0x7f0000001740)='./file0\x00', 0x200080, 0x141) sendmsg$nl_generic(r6, &(0x7f0000001ac0)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001a80)={&(0x7f00000017c0)={0x2c0, 0x30, 0x10, 0x70bd2d, 0x25dfdbfc, {0x1c}, [@typed={0x8, 0x4a, 0x0, 0x0, @uid=0xee00}, @generic="de839cbf2cf5c7630629dff10c27ad9ce0b8a448e1fb6eed0eb0ba90c9e0bf9b60cfaaf4c560ca4dee8f21c50982291d58e427d206ca7e44b84ccff648c8f5fbe540a7bbc08a12c6996dca745ec65d406bfe74f6da4fbdac08f3af437783641ed15cc49d0fe1b5c49356f4b8d725e728690017a905e147ff71a152234042ee40dfa338e3de0a8514d963775208a03f11d3f44ce141e0b9071907a38468247fef23bb55a57fb3127134dc57ddcf7fdbd14b979b9276042faec3367b65ab5f66ce2ed4a5ba08ea71891b93fcdeb482c7a99a", @generic="391ab75fda31a91bcde9deb8b68cc8423cd8458a49872299cdde3587e2a232ab52a66c849e129d5581bf1d5c384fdb1376e7af72276c63cd6d4f092cdc4eacc00613238dc3d7f46b871f2425df8394c126e8b00cfb742f071e330fc386cc075d99a68841746b7ca9199f9a99fa85e07daa2a0e5157234d98465774a6e9f50ed7", @typed={0x8, 0x7a, 0x0, 0x0, @pid=r1}, @nested={0x145, 0x85, 0x0, 0x1, [@typed={0x8, 0x41, 0x0, 0x0, @ipv4=@remote}, @typed={0x66, 0x73, 0x0, 0x0, @binary="52cc64cc54f8b9dd9a97a2a6addea39dc87720b109c02c3c263aacedaac60551a69fe059f5adc1e71cb28a2cbc72c017a594b1a2ab5f10efd0f22c33d49d5217600f230817ab347521d835fd4af58e281613b29785239180c9bd589895df0404aecc"}, @generic="e39f6fde8a902db741f50546b236f87bfbb7f93b7d50ff998d25512eef2c02c58e7a5f901068726c6ce2235fc85d9d8fee226e7936e7ef7008b650ab613b4f43151c72e755ad8e081b1cc620985a4957bf4d1a9d22eac0b20ba4487b2efdf4d06fc909d670c5cf87afc44e52e928522986b43bccf70dc663c7d618542dd4431d02ae49931f9e5e7d4ba85ffefe1b9fa77d37d760baaff59b69ea328777b1ef40383efbb49b7dc8a13249142dc250ddf98455572db9747811673cd5e60e492b2bb11d14fcaa57cef800e91664be147f1dac"]}]}, 0x2c0}, 0x1, 0x0, 0x0, 0x20000005}, 0x20000840) 13:32:22 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:32:22 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 23) 13:32:22 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1874.738760] FAULT_INJECTION: forcing a failure. [ 1874.738760] name failslab, interval 1, probability 0, space 0, times 0 [ 1874.741134] CPU: 1 PID: 11861 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1874.742545] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1874.744231] Call Trace: [ 1874.744785] dump_stack+0x107/0x167 [ 1874.745540] should_fail.cold+0x5/0xa [ 1874.746345] ? create_object.isra.0+0x3a/0xa20 [ 1874.747308] should_failslab+0x5/0x20 [ 1874.748088] kmem_cache_alloc+0x5b/0x310 [ 1874.748942] create_object.isra.0+0x3a/0xa20 [ 1874.749842] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1874.750876] kmem_cache_alloc_trace+0x151/0x320 [ 1874.751842] find_get_context+0x18d/0x9a0 [ 1874.752702] ? security_perf_event_alloc+0x79/0xa0 [ 1874.753707] ? ctx_sched_out+0xa00/0xa00 [ 1874.754545] __do_sys_perf_event_open+0xed5/0x2d50 [ 1874.755558] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1874.756553] ? perf_event_set_output+0x5b0/0x5b0 [ 1874.757523] ? wait_for_completion_io+0x270/0x270 [ 1874.758535] ? __startup_64+0x9/0x3b0 [ 1874.759327] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1874.760416] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1874.761665] do_syscall_64+0x33/0x40 [ 1874.762622] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1874.763919] RIP: 0033:0x7f6eb84dfb19 [ 1874.764794] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1874.768877] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1874.770535] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1874.771983] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1874.773441] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1874.774880] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1874.776332] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 13:32:22 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:32:22 executing program 0: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:32:22 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:32:22 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 24) [ 1875.075746] FAULT_INJECTION: forcing a failure. [ 1875.075746] name failslab, interval 1, probability 0, space 0, times 0 13:32:22 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) lstat(&(0x7f0000001740)='./file1\x00', &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x100000001) ioctl$SG_IO(r3, 0x2285, &(0x7f0000001280)={0x53, 0xfffffffffffffffb, 0x1000, 0x9, @buffer={0x0, 0xba, &(0x7f0000000100)=""/186}, &(0x7f00000001c0)="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", &(0x7f00000011c0)=""/139, 0xfffff1c9, 0x10017, 0x2}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r4 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = dup3(r1, r3, 0x0) r6 = openat$incfs(r1, &(0x7f0000001800)='.log\x00', 0x2002, 0x8) sendfile(r5, r6, &(0x7f0000001840)=0x7a67b35f, 0x2) clone3(&(0x7f00000016c0)={0xb94d200, &(0x7f0000000580)=0xffffffffffffffff, &(0x7f00000005c0), &(0x7f0000000600), {0x14}, &(0x7f0000000640)=""/18, 0x12, &(0x7f0000000680)=""/4096, &(0x7f0000001680)=[0x0, r4, r4, 0x0, r4, 0x0, 0x0], 0x7}, 0x58) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0xb, 0x0, 0xffffffffffffffff, r4}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) stat(&(0x7f00000000c0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r8, 0x0) chown(&(0x7f00000001c0)='./file1\x00', r8, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000018c0)={{0x1, 0x1, 0x18, r7, {r8, r2}}, './file1\x00'}) readv(0xffffffffffffffff, 0x0, 0x0) [ 1875.078283] CPU: 1 PID: 11877 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1875.079849] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1875.081719] Call Trace: [ 1875.082255] dump_stack+0x107/0x167 [ 1875.083011] should_fail.cold+0x5/0xa [ 1875.083778] ? __d_alloc+0x2a/0x990 [ 1875.084637] should_failslab+0x5/0x20 [ 1875.085412] kmem_cache_alloc+0x5b/0x310 13:32:22 executing program 0: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) [ 1875.086339] __d_alloc+0x2a/0x990 [ 1875.087157] d_alloc_pseudo+0x19/0x70 [ 1875.087949] alloc_file_pseudo+0xce/0x250 [ 1875.088813] ? alloc_file+0x5a0/0x5a0 [ 1875.089627] ? ctx_sched_out+0xa00/0xa00 [ 1875.090612] anon_inode_getfile+0xc8/0x1f0 [ 1875.091535] __do_sys_perf_event_open+0xf5d/0x2d50 [ 1875.092575] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1875.093648] ? perf_event_set_output+0x5b0/0x5b0 [ 1875.094618] ? wait_for_completion_io+0x270/0x270 [ 1875.095608] ? __startup_64+0x9/0x3b0 [ 1875.096392] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1875.097481] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1875.098685] do_syscall_64+0x33/0x40 [ 1875.099450] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1875.100587] RIP: 0033:0x7f6eb84dfb19 [ 1875.101344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1875.105406] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1875.107260] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1875.108810] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1875.110368] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1875.111817] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1875.113258] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 13:32:22 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1875.177011] blktrace: Concurrent blktraces are not allowed on sg0 13:32:22 executing program 0: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:32:22 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) [ 1889.526818] FAULT_INJECTION: forcing a failure. [ 1889.526818] name failslab, interval 1, probability 0, space 0, times 0 [ 1889.528141] CPU: 1 PID: 11901 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1889.528882] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1889.529773] Call Trace: [ 1889.530061] dump_stack+0x107/0x167 [ 1889.530452] should_fail.cold+0x5/0xa [ 1889.530868] ? create_object.isra.0+0x3a/0xa20 [ 1889.531359] should_failslab+0x5/0x20 [ 1889.531772] kmem_cache_alloc+0x5b/0x310 [ 1889.532214] create_object.isra.0+0x3a/0xa20 [ 1889.532701] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1889.533243] kmem_cache_alloc+0x159/0x310 [ 1889.533692] __d_alloc+0x2a/0x990 [ 1889.534068] d_alloc_pseudo+0x19/0x70 [ 1889.534478] alloc_file_pseudo+0xce/0x250 [ 1889.534924] ? alloc_file+0x5a0/0x5a0 [ 1889.535336] ? ctx_sched_out+0xa00/0xa00 [ 1889.535772] anon_inode_getfile+0xc8/0x1f0 [ 1889.536226] __do_sys_perf_event_open+0xf5d/0x2d50 [ 1889.536757] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1889.537273] ? perf_event_set_output+0x5b0/0x5b0 [ 1889.537775] ? wait_for_completion_io+0x270/0x270 [ 1889.538293] ? __startup_64+0x9/0x3b0 [ 1889.538707] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1889.539269] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1889.539825] do_syscall_64+0x33/0x40 [ 1889.540220] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1889.540785] RIP: 0033:0x7f6eb84dfb19 [ 1889.541184] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1889.543135] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1889.543945] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1889.544712] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1889.545471] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1889.546227] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1889.546981] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 13:32:36 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:32:36 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa4"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:32:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x10400, 0x0) r3 = accept4(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000180)=0x80, 0x0) sendfile(r2, r3, &(0x7f00000001c0)=0x3, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x40) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) open(&(0x7f0000001740)='./file0\x00', 0x200080, 0x141) 13:32:36 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:32:36 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 25) 13:32:36 executing program 5: ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x226182, 0x0) r1 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f00000016c0)={0xb94d200, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600), {0x14}, &(0x7f0000000640)=""/18, 0x12, &(0x7f0000000680)=""/4096, &(0x7f0000001680)=[0x0, r1, r1, 0x0, r1, 0x0, 0x0], 0x7}, 0x58) r2 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f00000016c0)={0xb94d200, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600), {0x14}, &(0x7f0000000640)=""/18, 0x12, &(0x7f0000000680)=""/4096, &(0x7f0000001680)=[0x0, r2, r2, 0x0, r2, 0x0, 0x0], 0x7}, 0x58) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000100)={'\x00', 0x0, 0x40000009, 0x7, 0xb, 0x4, r2}) readv(0xffffffffffffffff, 0x0, 0x0) 13:32:36 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:32:36 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) [ 1889.577027] Process accounting paused [ 1889.600925] blktrace: Concurrent blktraces are not allowed on sg0 13:32:36 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:32:37 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:32:37 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 26) [ 1889.681379] FAULT_INJECTION: forcing a failure. [ 1889.681379] name failslab, interval 1, probability 0, space 0, times 0 [ 1889.682756] CPU: 1 PID: 11921 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1889.683629] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1889.684511] Call Trace: [ 1889.684815] dump_stack+0x107/0x167 [ 1889.685213] should_fail.cold+0x5/0xa [ 1889.685621] ? __alloc_file+0x21/0x320 [ 1889.686036] ? __alloc_file+0x21/0x320 [ 1889.686451] should_failslab+0x5/0x20 [ 1889.686856] kmem_cache_alloc+0x5b/0x310 [ 1889.687296] __alloc_file+0x21/0x320 [ 1889.687697] alloc_empty_file+0x6d/0x170 [ 1889.688131] alloc_file+0x5e/0x5a0 [ 1889.688512] alloc_file_pseudo+0x16a/0x250 [ 1889.688975] ? alloc_file+0x5a0/0x5a0 [ 1889.689391] ? ctx_sched_out+0xa00/0xa00 [ 1889.689824] anon_inode_getfile+0xc8/0x1f0 [ 1889.690299] __do_sys_perf_event_open+0xf5d/0x2d50 [ 1889.690820] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1889.691339] ? perf_event_set_output+0x5b0/0x5b0 [ 1889.691847] ? wait_for_completion_io+0x270/0x270 [ 1889.692365] ? __startup_64+0x9/0x3b0 [ 1889.692780] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1889.693358] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1889.693908] do_syscall_64+0x33/0x40 [ 1889.694321] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1889.694865] RIP: 0033:0x7f6eb84dfb19 [ 1889.695277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1889.697235] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1889.698068] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1889.698857] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1889.699646] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1889.700430] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1889.701233] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 13:32:37 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:32:37 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, r3, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, r6, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r9 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r7, r8, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, r9, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x50eb, &(0x7f0000000180)={0x0, 0xbcd6, 0x0, 0x3, 0x15b}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r10 = syz_open_dev$ptys(0xc, 0x3, 0x1) r11 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x20000, 0x2, 0x16}, 0x18) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_SPLICE={0x1e, 0x5, 0x0, @fd, 0x79, {0x0, r10}, 0xc5ab, 0xc, 0x1, {0x0, 0x0, r11}}, 0x1) syz_io_uring_submit(r4, r5, 0x0, 0xfffffffc) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:32:37 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 27) 13:32:37 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) [ 1889.797407] FAULT_INJECTION: forcing a failure. [ 1889.797407] name failslab, interval 1, probability 0, space 0, times 0 [ 1889.798820] CPU: 1 PID: 11932 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1889.799555] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1889.800428] Call Trace: [ 1889.800731] dump_stack+0x107/0x167 [ 1889.801120] should_fail.cold+0x5/0xa [ 1889.801527] ? create_object.isra.0+0x3a/0xa20 [ 1889.802013] should_failslab+0x5/0x20 [ 1889.802432] kmem_cache_alloc+0x5b/0x310 [ 1889.802868] create_object.isra.0+0x3a/0xa20 [ 1889.803331] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1889.803873] kmem_cache_alloc+0x159/0x310 [ 1889.804317] __alloc_file+0x21/0x320 [ 1889.804721] alloc_empty_file+0x6d/0x170 [ 1889.805151] alloc_file+0x5e/0x5a0 [ 1889.805533] alloc_file_pseudo+0x16a/0x250 [ 1889.805983] ? alloc_file+0x5a0/0x5a0 [ 1889.806397] ? ctx_sched_out+0xa00/0xa00 [ 1889.806828] anon_inode_getfile+0xc8/0x1f0 [ 1889.807280] __do_sys_perf_event_open+0xf5d/0x2d50 [ 1889.807809] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1889.808327] ? perf_event_set_output+0x5b0/0x5b0 [ 1889.808846] ? wait_for_completion_io+0x270/0x270 [ 1889.809364] ? __startup_64+0x9/0x3b0 [ 1889.809791] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1889.810370] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1889.810919] do_syscall_64+0x33/0x40 [ 1889.811329] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1889.811870] RIP: 0033:0x7f6eb84dfb19 [ 1889.812281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1889.814228] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1889.815053] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1889.815840] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1889.816633] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1889.817422] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1889.818206] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 [ 1889.835244] blktrace: Concurrent blktraces are not allowed on sg0 13:32:37 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:32:50 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)) openat(r0, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:32:50 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:32:50 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:32:50 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 28) 13:32:51 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x10000, 0x5, &(0x7f0000000540)=[{&(0x7f0000000140)="a784a622f09b9b40219527f82fe2b80f9200089367b62e825b13ca5b9bda54caa4effec54832e05c63ee0b9efd3332d1fe556d7278329983b7d20fc5533d3995c7aa60e1142726cf0cba706e943138204f2c05102a254773e8e5b58d7a1b228cf1e345e64773741071099908ada1fe79d065c2c4405a23d02b384f325de18542568da0f901fa679a59e2a615a514e8864f7574dabed62ee9e6c0f2981ef6a48e6ad7e7a87ee3f8498d810a3dd545fa6ce404bba6c142f122907146ee3899235037a06ca61e7dfa10", 0xc8, 0xfffffffffffffe12}, {&(0x7f0000000240)="7de73e6752c8138020e16b70a68825280e6a05b316c5402410f7a30060318db956ff0d397440da5da9018ec767cff9028ab54c7ed82d53e7494b2f5d05bf7ebe7dc8f946fb6b355a238afeb754f123c2511b72f8", 0x54, 0x5}, {&(0x7f00000002c0)="82ea1b25469174af44dcce8d6533107bf39aa558991338cd550e63bb057171bcc02feb0ff8ee6f0806e42c76a468b7d4c31b7df91078893133decea7c6025212d85474de49cc365d2d90bb0f58e476c22846761a9a8a714ef7556d87c30a0e5eea7f48df41a87d18dfa0a1d819e17fa65cb8c352469a8c0fb8878be95755ba72012ff178d32d0ed3ac99236df6c938851624311fe51a8b2a98c5652d4d115a91d57b7b186a5a2bd6002657c178c274fb8a6cb4582e0547074ee446b2c3f826239b7700b746c1f280caf2589bec92a8793bc2dafd63c003987a053ab907b1f643b181cc827eb33c3013bccc", 0xeb, 0x68b9}, {&(0x7f00000003c0)="96b3d290937b4a9edc558dcd2e15dad4856689faf80c69428f8b92132426e52839fbc65bb627e0cef16b391e5349f126bf1a679be14e7e7d91848468b39131e88a0b492779536ed44a70e3551b868c772fb7b48ff2980261dda7dc7d4372a391fe17b9917ec6ae5617a993279be38d12bd0ad2ae277d4d164747f3b12aa8c155cfa4e8ec5b1247ad13b7c6abe4c86270c0d483a06c4176d171dcfef212365f1ba183e41da3bc75a46a37ffe789f3e32675affbc4fdb460aaf3e0d42b091b116c5592715909fed61dd75c82dae12932eddc76f035a5384ae1eecab1054e", 0xdd, 0x7fffffff}, {&(0x7f00000004c0)="d9c2d7a3e620c796a42402f5bb0b7680a7404b1994e92139299c313740e833e2cc64921299e4e342adb21cfd059ba3149b2c094cfb15f3562344da397c4e3a1c1d61e590ebc3a0de7ce5367270063513d1e25db8d3091855d4a6733df294efc897ca", 0x62, 0x100000000}], 0x10000, &(0x7f00000005c0)={[{@journal_dev={'journal_dev', 0x3d, 0x100010000000000}}, {@nobh}, {@errors_remount}, {@data_journal}], [{@context={'context', 0x3d, 'root'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}, {@obj_type}, {@uid_gt={'uid>', 0xee00}}]}) dup2(r0, r1) 13:32:51 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:32:51 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x10400, 0x0) r3 = accept4(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000180)=0x80, 0x0) sendfile(r2, r3, &(0x7f00000001c0)=0x3, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x40) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) 13:32:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) [ 1903.637605] FAULT_INJECTION: forcing a failure. [ 1903.637605] name failslab, interval 1, probability 0, space 0, times 0 [ 1903.640178] CPU: 1 PID: 11943 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1903.641672] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1903.643452] Call Trace: [ 1903.644030] dump_stack+0x107/0x167 [ 1903.644826] should_fail.cold+0x5/0xa [ 1903.645663] ? security_file_alloc+0x34/0x170 [ 1903.646644] should_failslab+0x5/0x20 [ 1903.647479] kmem_cache_alloc+0x5b/0x310 [ 1903.648363] security_file_alloc+0x34/0x170 [ 1903.649328] __alloc_file+0xb6/0x320 [ 1903.650140] alloc_empty_file+0x6d/0x170 [ 1903.651018] alloc_file+0x5e/0x5a0 [ 1903.651799] alloc_file_pseudo+0x16a/0x250 [ 1903.652709] ? alloc_file+0x5a0/0x5a0 [ 1903.653560] ? ctx_sched_out+0xa00/0xa00 [ 1903.654447] anon_inode_getfile+0xc8/0x1f0 [ 1903.655360] __do_sys_perf_event_open+0xf5d/0x2d50 [ 1903.656437] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1903.657499] ? perf_event_set_output+0x5b0/0x5b0 [ 1903.658527] ? wait_for_completion_io+0x270/0x270 [ 1903.659586] ? __startup_64+0x9/0x3b0 [ 1903.660430] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1903.661581] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1903.662709] do_syscall_64+0x33/0x40 [ 1903.663525] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1903.664644] RIP: 0033:0x7f6eb84dfb19 [ 1903.665476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1903.669479] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1903.671136] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1903.672688] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1903.674247] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1903.675796] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1903.677354] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 13:32:51 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 29) 13:32:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) [ 1903.764402] FAULT_INJECTION: forcing a failure. [ 1903.764402] name failslab, interval 1, probability 0, space 0, times 0 [ 1903.767405] CPU: 1 PID: 11967 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1903.768933] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1903.770755] Call Trace: [ 1903.771346] dump_stack+0x107/0x167 [ 1903.772170] should_fail.cold+0x5/0xa [ 1903.773002] ? create_object.isra.0+0x3a/0xa20 [ 1903.774000] should_failslab+0x5/0x20 [ 1903.774838] kmem_cache_alloc+0x5b/0x310 [ 1903.775727] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1903.776955] create_object.isra.0+0x3a/0xa20 [ 1903.777917] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1903.779024] kmem_cache_alloc+0x159/0x310 [ 1903.779940] security_file_alloc+0x34/0x170 [ 1903.780907] __alloc_file+0xb6/0x320 [ 1903.781724] alloc_empty_file+0x6d/0x170 [ 1903.782614] alloc_file+0x5e/0x5a0 [ 1903.783400] alloc_file_pseudo+0x16a/0x250 [ 1903.784338] ? alloc_file+0x5a0/0x5a0 [ 1903.785198] ? ctx_sched_out+0xa00/0xa00 [ 1903.786097] anon_inode_getfile+0xc8/0x1f0 [ 1903.787021] __do_sys_perf_event_open+0xf5d/0x2d50 [ 1903.788119] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1903.789208] ? perf_event_set_output+0x5b0/0x5b0 [ 1903.790237] ? wait_for_completion_io+0x270/0x270 [ 1903.791306] ? __startup_64+0x9/0x3b0 [ 1903.792169] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1903.793329] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1903.794457] do_syscall_64+0x33/0x40 [ 1903.795279] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1903.796402] RIP: 0033:0x7f6eb84dfb19 [ 1903.797226] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1903.801225] RSP: 002b:00007f6eb5a55188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1903.802881] RAX: ffffffffffffffda RBX: 00007f6eb85f2f60 RCX: 00007f6eb84dfb19 [ 1903.804447] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001d80 [ 1903.805991] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1903.807540] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1903.809120] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 13:32:51 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:32:51 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 30) [ 1903.921458] FAULT_INJECTION: forcing a failure. [ 1903.921458] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1903.924409] CPU: 1 PID: 11974 Comm: syz-executor.4 Not tainted 5.10.183 #1 [ 1903.925924] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1903.927729] Call Trace: [ 1903.928332] dump_stack+0x107/0x167 [ 1903.929153] should_fail.cold+0x5/0xa [ 1903.929986] _copy_to_user+0x2e/0x180 [ 1903.930836] simple_read_from_buffer+0xcc/0x160 [ 1903.931851] proc_fail_nth_read+0x198/0x230 [ 1903.932839] ? proc_sessionid_read+0x230/0x230 [ 1903.933844] ? security_file_permission+0x24e/0x570 [ 1903.934931] ? perf_trace_initcall_start+0x101/0x380 [ 1903.936049] ? proc_sessionid_read+0x230/0x230 [ 1903.937082] vfs_read+0x228/0x580 [ 1903.937847] ksys_read+0x12d/0x260 [ 1903.938628] ? vfs_write+0xa70/0xa70 [ 1903.939448] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1903.940604] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1903.941737] do_syscall_64+0x33/0x40 [ 1903.942565] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1903.943676] RIP: 0033:0x7f6eb849269c [ 1903.944514] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1903.948517] RSP: 002b:00007f6eb5a55170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1903.950195] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f6eb849269c [ 1903.951736] RDX: 000000000000000f RSI: 00007f6eb5a551e0 RDI: 0000000000000004 [ 1903.953313] RBP: 00007f6eb5a551d0 R08: 0000000000000000 R09: 0000000000000000 [ 1903.954847] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1903.956404] R13: 00007ffcdc25319f R14: 00007f6eb5a55300 R15: 0000000000022000 13:33:07 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:33:07 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:33:07 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:33:07 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:33:07 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:33:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x10400, 0x0) r3 = accept4(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000180)=0x80, 0x0) sendfile(r2, r3, &(0x7f00000001c0)=0x3, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x40) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) 13:33:07 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x80000001, 0x0, 0x800000000000000}) rmdir(&(0x7f0000000100)='./file1\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x121800, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x110, r1, 0xe94b1000) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x708c2, 0x11) sendfile(r2, r3, 0x0, 0x100000001) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 13:33:07 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:33:07 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:33:07 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) [ 1920.113693] Process accounting resumed 13:33:07 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:33:07 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:33:07 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:33:07 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:33:07 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:33:24 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:33:24 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:33:24 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x10400, 0x0) r3 = accept4(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000180)=0x80, 0x0) sendfile(r2, r3, &(0x7f00000001c0)=0x3, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x40) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x100000001) 13:33:24 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)={0x7f, 0xfffffffffffffffb, 0x5, 0x1, 0x1, [{0xffffffffffffa538, 0x6, 0x100000001, '\x00', 0x2}]}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:33:24 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:33:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:33:24 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:33:24 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:33:24 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:33:24 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:33:45 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:33:45 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:33:45 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:33:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x10400, 0x0) r3 = accept4(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000180)=0x80, 0x0) sendfile(r2, r3, &(0x7f00000001c0)=0x3, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x40) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x100000001) 13:33:45 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:33:45 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, 0x0, 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:33:45 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000080)={0x0, 0xfdfdffff, 0x0, 0x0, '\x00', [{0xffffffff, 0x7}, {0xffffffff, 0x0, 0x0, 0xfffffffffffffffe}]}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:33:45 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:33:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x10400, 0x0) r3 = accept4(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000180)=0x80, 0x0) sendfile(r2, r3, &(0x7f00000001c0)=0x3, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x40) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x100000001) 13:33:45 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:33:45 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, 0x0, 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:33:45 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:33:45 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x13, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:33:45 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:33:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x10400, 0x0) r3 = accept4(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000180)=0x80, 0x0) sendfile(r2, r3, &(0x7f00000001c0)=0x3, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x40) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x100000001) [ 1958.611969] Process accounting paused 13:33:46 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) sendfile(r1, r3, 0x0, 0x80000001) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100), 0xa20009, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@debug={'debug', 0x3d, 0x6}}], [{@obj_type={'obj_type', 0x3d, '^(\\-'}}, {@fsname={'fsname', 0x3d, '/dev/sg#\x00'}}, {@context={'context', 0x3d, 'root'}}, {@dont_hash}, {@fsname={'fsname', 0x3d, '/dev/sg#\x00'}}, {@audit}, {@euid_gt}]}}) 13:33:46 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, 0x0, 0x40481, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:33:46 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:33:46 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:34:02 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x10400, 0x0) r3 = accept4(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000180)=0x80, 0x0) sendfile(r2, r3, &(0x7f00000001c0)=0x3, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x40) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x100000001) 13:34:02 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:34:02 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x14, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:34:02 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:34:02 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:34:02 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}], 0x2, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:34:02 executing program 3: getxattr(0x0, 0x0, &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:34:02 executing program 5: ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) socket$packet(0x11, 0x0, 0x300) msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = msgget(0x2, 0x22e) msgctl$IPC_RMID(r1, 0x0) msgrcv(r1, &(0x7f0000000300)={0x0, ""/8}, 0x10, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) msgrcv(0x0, &(0x7f0000000100)={0x0, ""/202}, 0xd2, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x5e20, 0x1, @mcast1, 0x20}, 0x1c) r2 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:34:02 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x26, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:34:02 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x10400, 0x0) r3 = accept4(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000180)=0x80, 0x0) sendfile(r2, r3, &(0x7f00000001c0)=0x3, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x40) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x100000001) 13:34:02 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:34:02 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:34:02 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:34:02 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}], 0x1, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:34:20 executing program 3: getxattr(0x0, 0x0, &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:34:20 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x111, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:34:20 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}], 0x1, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:34:20 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x80000001, 0x5a5d243ef4ffa74c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r1, r2, 0x0, 0x20d315) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x105100, 0x0) timerfd_gettime(r1, &(0x7f0000000000)) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:34:20 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x10400, 0x0) r3 = accept4(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000180)=0x80, 0x0) sendfile(r2, r3, &(0x7f00000001c0)=0x3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) 13:34:20 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:34:20 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) 13:34:20 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:34:20 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) [ 1992.750536] Process accounting resumed 13:34:20 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:34:20 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f00000001c0), 0x3, 0x2c0c1) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001200)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000001240), &(0x7f0000001280)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$BTRFS_IOC_RM_DEV(r2, 0x5000940b, &(0x7f0000000200)={{}, "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"}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000012c0)={0x44, r3, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6tnl0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bridge0\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x20040011}, 0x8000) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000001240)={0xf8dc, 0xc6a, 0x7fffffff}, 0xc) 13:34:20 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x77, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:34:20 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:34:20 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x78, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:34:36 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:34:36 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) 13:34:36 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}], 0x1, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:34:36 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:34:36 executing program 3: getxattr(0x0, 0x0, &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:34:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x10400, 0x0) accept4(r0, &(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000180)=0x80, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 13:34:36 executing program 5: creat(&(0x7f0000000200)='./file0\x00', 0x4) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, r3, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, r2, 0x0, 0x1) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7, 0x0, 0x2}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)=ANY=[@ANYBLOB="01000000010000003a000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="02000000000000002e2f66696c653000"]) pwrite64(r4, &(0x7f0000000100)="c69e98e64f6c8591006e49ddcc553e38a67ccb46433f496c84410ea4ae6fc11fefcbe7f571e910be2e572803d1a00bbf3e58530eb6f2d86f30f61ac0d29f17efd077a57e8380ddd91310f475cf6001edea4799cbdd34541423af7a5538ca78b8818e41e1b278649e8897192cb27fdd0a9a187942a2cf4c377940a94e880700e892d08adbed9e168281df6486b152cd1794d008fa0267a0960f4a64286c831a6157af11a06c14ab6b36704bf93613e1e34fc45d37c00b5a695e0e290f2b3c89bbbb546171ad3c5a5d97164949d8ea273934a7f8b071b8bd984c7460986590833ddc7ccd1b11c1f5b0d5f69bfd9841d89f54e0b99257", 0xf5, 0xffff) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:34:36 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 2009.074969] blktrace: Concurrent blktraces are not allowed on sg0 13:34:36 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:34:36 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:34:36 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:34:36 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) 13:34:36 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:34:36 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r0, 0x0, 0x0, 0x0) 13:34:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x10400, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 13:34:36 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000240)=ANY=[@ANYBLOB="010000000100000018000000502d0ca8a9d8a109701219cb81954c993e2e605a3213a8492735865b8837a4f36d207b29befbb292ed934e00", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f6669634d9cc06a320782ce89e86d4b6c6530009e10def88ea9fe2efa55863c608f89d8e9e30aaf6a650eae80292c405a99217b0956c88b8c3f33bc2567154c4057ab68a38916618ba2a7b328a02b26a75cbb5ad2a49da43353b06c487d54ead3186f943e318c5a3295a8252fcf66657339ed4e344fd8720a7f771a45023f0f0e6d4ff569b4aa327175e32e"]) ioctl$sock_ifreq(0xffffffffffffffff, 0x8994, &(0x7f0000000200)={'veth1_to_hsr\x00', @ifru_data=&(0x7f0000000000)="d5ffdffcd0272fb7b942fcfa732652778172561ae0c322bae504898ec1391509"}) io_uring_enter(r1, 0x1dbd, 0x2895, 0x1, &(0x7f0000000100)={[0x3]}, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000340)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)={0x8800, 0x22}, &(0x7f00000001c0)='\x00', 0x18, 0x0, 0x23456, {0x0, r4}}, 0xffffffff) sendfile(r2, r3, 0x0, 0x20d315) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) fsetxattr$security_selinux(r2, &(0x7f0000000380), &(0x7f00000003c0)='system_u:object_r:logrotate_exec_t:s0\x00', 0x26, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x100000001) ioctl$SG_GET_LOW_DMA(r6, 0x227a, &(0x7f0000000140)) 13:34:36 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:34:36 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:34:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x86) 13:34:51 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {0x0}], 0x2, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:34:51 executing program 5: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) ppoll(&(0x7f0000000300)=[{r0, 0x12}, {r0}, {r2, 0x1}, {0xffffffffffffffff, 0x100}, {r1}], 0x5, &(0x7f0000000340), &(0x7f0000000380)={[0x4]}, 0x8) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000140)={0x7b, 0x0, 0xabb2, "15735b291fbc7738369f937b342667d3da03fe65519699be81485d8e9d495782b8e0661dc76f39a05800e39ca09689207b1b7b375e30a0f813dbd63f17ab944c72dba5fe48eb3c2302183716f90a7c6301148240152ca84b0a602a7a8d6cfdda1ab2f0f6a280e325dba820455e1e7efead0b1c7bedcb68336e85dd"}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000a40)='./file1\x00', 0x980, 0x102) poll(&(0x7f0000000a80)=[{r3, 0x200}, {r4}, {r1, 0x1000}], 0x3, 0x7) getsockname$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000ac0)=ANY=[@ANYBLOB="00000a4f32e504b7007ef9868e0000100000"]) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f00000003c0)={0x5, 0x6, 0x20, 0x6, 0x80000001, 0x3}) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x100000001) write$binfmt_elf64(r6, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x93, 0x20, 0x1, 0x6, 0x367a, 0x2, 0x3e, 0x1, 0x2ab, 0x40, 0x1df, 0x10001, 0x4, 0x38, 0x2, 0x200, 0x5}, [{0x6474e551, 0x4, 0x8, 0x1f, 0x9, 0xfeb, 0x5, 0x2}, {0x1, 0x1ff, 0x0, 0x1, 0x3, 0x80, 0x0, 0x79}], "a3e23e46b139663c4cc6172c0d889558701ae591bcd2ebb7b40be622af97f4a59cc100ab5678518cfc98f6ec367085068eedf4a72bc361de063dc2c49a7b5f87c532078c5d3dd99d9b463bd601cbf2ee04ab1ba4885f147f9a825ecf9eadc76c61852eb56f7c6252f4e99fb7547f9c0697ff5ce9ceeb0169b6dabfca049327d89a3bfe9a9d", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x635) readv(0xffffffffffffffff, 0x0, 0x0) 13:34:51 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r0, 0x0, 0x0, 0x0) 13:34:51 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) 13:34:51 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:34:51 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:34:51 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x10400, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 13:34:51 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) 13:34:51 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) 13:34:51 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:34:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x86) 13:34:51 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {0x0}], 0x2, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:34:51 executing program 6: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r0, 0x0, 0x0, 0x0) 13:34:51 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) 13:34:51 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x9, 0x24, 0x7, 0x1, 0x0, 0x3, 0x240c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x2, @perf_config_ext={0x280000000, 0x81}, 0x50, 0x3, 0xa02, 0x2, 0x42b, 0x5, 0xc639, 0x0, 0x10001, 0x0, 0x400}, r1, 0x2, r0, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 13:34:51 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) [ 2024.626479] Process accounting paused 13:35:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 13:35:08 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:35:08 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {0x0}], 0x2, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:35:08 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x86) 13:35:08 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:35:08 executing program 6: getxattr(0x0, &(0x7f0000000580)=ANY=[], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:35:08 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) sendfile(r1, r3, 0x0, 0x80000001) sendfile(0xffffffffffffffff, r3, 0x0, 0xfdfffffffffffffe) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:35:08 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) lstat(&(0x7f0000001740)='./file1\x00', &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x100000001) ioctl$SG_IO(r3, 0x2285, &(0x7f0000001280)={0x53, 0xfffffffffffffffb, 0x1000, 0x9, @buffer={0x0, 0xba, &(0x7f0000000100)=""/186}, &(0x7f00000001c0)="5ee09e2904e603e27d4b98905586f1682a7b1ebb33f829f928e2cf439fd6b525abd8ef515237bb6d5ed49aa5cf9c50a5446ade51728455edc7e0ea920c45d48ba000f25b3e327acb2aaff9ee0ddac8738ebf13cba67a73dabd1cb79d3b3e9ac038fe2b915f89db5fa156e39901232090774f45d7eaecd8ecb94803b53ec30a89ef7d80c6d80d5949e31a877664e97f82dcaaeff88bf828a2636ee34d2f8e1cf80f11bec75326d589e63d278b1652d55beaecf5a4c028090d1d8885a26c14e88436d496a22132384e5aa701d7ac1f65c781d4e2773881b8399259939cbefdfb090f88206e070f2f1865054724db0f5a4efff827ca78f45eaca16095771f6be030f7719e46a7ba0153d283f05de303be3d2cb2a1a1f678174f9decaeed05c5d4e1512f91e6c491c8222b139c30363a3e96ab7b298897e6ad6c1941469fd1d676115093208e7c4a0ecf13f3db25de220f3bed7900fb2226b3be48665ed4537a9faa1c84aac7905ec296b770a9f32248a9fdef0533cc77a9d337e3da9bc6a4c0f676d62afae277f3a4dd3f553ff90877e5ddc588e9e334508f19ca9656d061882a8ea073781f3f3d6bcd33d214ad01a89cab44c4246b7b7b864fcb977ea4e790272ab52bb175b93c13c4fbbdce958086e75ed8195bad02a23d35aecac63ca1b32c34a8bf04f2f76a5d08b3bacce291ebeae09cd20cb23c245a172966d102c46099b503bdb7cd62b641173c750eabe80c07058d19d7042ea23153c9688f24c0d4ccf8f9439b98d596058a1afe6a1e77a6f295c5c85c7eefbc98397b66fe1cea8b1eccc0b75b240a1a29436e82d36d35a06cd1101431356b34db93f27e9596fe19736d1c8ba204e12508300ae0f6b35a45e2c9253a40dec0b958eb7986b449c9d86d54d5de5685043216310b7e806b62f4653be1b47c6c67cde16bbd2ae74b3fdd0386ddb7e42715ae1bb9c9c48464ab29fbb84db43f1e99b21828e9eb6f50eb9c69d4aa705583f456db27a5af307fc807219f79fb039b619228cd0cff720c598a0fd7dc59df34ba5beb215035412b26213608de97b88fea1f0dc1779608fb71ade4faf15b9a5fd812ad415450f1e75599bb84a1f86277f56cc35f9fc1177abfd0913eda23bbf83767f18cfacb403c43259c4ecddcbbd3198ed097e4ae9a281b73af011ee637638e1ed4fe3ec38ada2b44d91dc4e881d41968c6caa404faf2d915d16342af5ad9ef6d87ae16e2dc7899bc57a01fbe2d987cf974a61db8cefc782f2734f9b721047089db83fe15b6eb83086e18d0ff67ee6bb19f2f72511d5242d906b6cf0243f9b7769df55f9850c56e4e19f0ffddb2064ec96c641f2798d8df4ad4173df87ccf7d5c49cf9993de9298949958dadd3dcd2cc88dbf024175d440be7ef7ca73dd7a8f056f68224cf87b843e67d45fc53d13854975b6b7a706a2b350afd77c57b6f7cd55ec41938b4309a30e5928be16c615db5e6179d8d2f5d9787cc371b0536e1cb30930be1c6e569801a72e695735d1be9b749ca056c008e1f0705a440ed1ceb23e77978452b0902c1306534bd42a987388e935fd6510c64e3ac5fadcdb7cb5e48a5a800240b2b0e2fee01b5f7d1ab3897b20c05116a6079d4d66b450e3bb56022f82838fa487d746a26ac5ecfc563610c109c257eafd32a176a2d42fcf2b23710895f50eb246bf53f2aeaa16cb0137ae2e92098f73f42e4edfe1bb367ca2e2942b56fa774516dbf31ec114fa527dd73c89d547c3554ddca86a05e96f37306241ff42f9983d83acd8c9a5fa60ac47e0454870702c930a98385987c5458c44ed52c2a1033e7a3c0bb1ccaf08fd8bbb7550a9e57dd52c02db2fa60ce30398149aba6cb68607290952bde09a1b3d6cb3eecfaedcd73dbd8f7baf23107e0bc3376a8b1a8796edd598ec2e03277839dcc660b8d24b380e1a5aab01daf70045a76e8a7185362b8a4e56f81be8f6499cd53ef3ab514dba20c4582d70b38f1ef6823913eaf16dadba1d56e24bc3e9b4812d9f8e7091001a673d3eaff2b9526ce3d233b9c52e9608011b74d85ee64fc0991751003cdacf609a13ac389869c412edc526da271cb6412072506cc80a3781dbf4a93a5e8da0fc17301312542245f60eb2738248c5655946d80c3960b1d91eb96e9f1fcef39f726cea5bd5efb1cf5cc962ef4097bce565d0c5e3d007877377c4233f4a3b1c2f0522661214eafca0c745f5088bf3acf3b517680b9574c33f65bde1d6e1c782f97588489edd937c5f92e6b14a2e7dd51e45fa8ab60b00ee8be5ded0004aefd58f3d4d94dc3aa07eb3fef49093bd2e0dbe8dcc995e634f0f3420be5b6d8465d0e7b0045d432f7098ab68f9ef435ba7b4820cd68f1bf12e17e2f9762c54f7ae5f8e0d037b2538d3bb1d2ec253fb52cde828846c17cd6bc3f80c9e400d6aa742ae63936d11e2c31323e02c9b15cc368a975ad2a04cc38e367985238f0779af5548dd0757c679eeb92fbf8865964bab6ae1112fa19e075ab5bfe831f264e884445188bd43440baeaf038508eee592102764e8ad24b2a9afc89d5ce527ca9a9e6e2ac575d9c4f431afe943a9f36605d3769216a64a39410632ac119a1ac3cc4414c9f4b60b6545b3ff79adaf9cee4417e10a7c92b20cf577a63876c03e2d919076ee464bd80423ef6487b3d07122bd530d90d8ceb789a08d075086b08ab006e367148b93bacf758e095cf237b9d3f628f01c56eed90db000100bb4e9d5acde130a838bc0ca660acb143f96edbdad96df1235f57be39c68533cfa34570a88b4b3241921369fc6c3cf46bbf95245ae98dc2d78d9eee2c409fdab096c7d01da087787d7517a96f97a3341c6987ba6c81a63a1c3f59724aea9c4b1a3e441b50525bc3c6bfc796de04ef913082bcb03261dadb2da5a89d8b81c6994ffc31e1f40e5ceebf7c482c0d0ea42188caf4aab4da4c2bb246be6e72a30bd3ce76a1e9e9ca16461168f2dd65e4b952877a21f4c8d46140a7a223a8f189ea664d898671e3b0d130a807ce97c0ee1e42976943f232e6d284c5c531610bbd42a76d8ff78f3b06df96f3c95fb34ca9e8b8aa717cca6923bfa8f5ac9a3fcc564e95149c1af198fb4bdabea91df3778ea437c709d9a9a1fda5ce828c9854b81710bb99f2475bdbef885b5a1724310bfd708d1eff828e79d46e2c1e2a6edd0fe2a12de7adbb8adb232feac1428dd4b25f47a965772666c4435b02c0ae42809b1eaa94b23c00fa7fac0c9c32fd0f91349e77d80cfd1a694b058f3a465ef68913a4b12f220a66bd96ecd5f5c166ec89aba7b2f8c752b5f34ec76706645c965cf835f21bc9eb03e5124fdfa0b982cc3ad6118eaedfb6fd0b5ea480c45734630ccddb9015410a9958335118a669237667e9ac64da9eae1874cb04c3477f32da19b26bda982855bbc09bdcddc5312d12dda05ed8413b981f2dff884e38b86e3e03576d0d1379b42319073d750c38310d40842796463fff95e9e5da795c7277d44eb2def917bf230dbc72bb0514a2f73a18a6e70d6926d6f95987b1105158e6f2acdb04dde5858a083d8ee80adf64d7660bd458c346ed1b2958ba3da231a020301eafb2605854a4047134a583f34b8caae8f147cffe8e1107dbc3ddad2feb9abb3957c9d2477b426db2f49647c0cc69b8f2f540991cdeb72ec1a714afad83504508da4b82739f9f22d393d64fe48b8c05f5f4ab7a0e8551957076c889ebd013050725726c98dd13d24d6dba6857841ecb3101bd7cc0980dcacbba1e3c464c11b101e9a045a4d6d0900c7327f372b3b76ee718669d63631d00709ad808801bef9b9570bc3296b7ed81f8f815ce6fa1bb4b93f800cf949daba8ebfd787e2cae5bea0eca6e9de3cfc66189aab70b2154411fa52cc1219071032530a3554fdad9e45845d5f98e6ae91e6634606748142ab8aa4f46c3bd7857025461614e81008c0f07326212fde7d3081cb254061850eabe23a79d53ea27522e5db67eea74068fd3d152f011f369e0c57ce3bb5c3907471fdbb736c856f1470dd0e79752b265fb2b36b8d5967e80ba9a4209f4d6ff60f00124f75811f4e7fab605f726fed91082ce1ca1149f302c4a864c152c8364cce8dfa449a59d4a6995e77d1d52ece4bea68aa7dee5c2dc9edafebb51b89013fdad389b6cb9aca91d078cc3ded3da3e67df5a14672d0a82574e670212b07a88b202d81a61b6ff6b025da4e8e09d88da259414b8197f981610af26f3ec3d161ee74024c3d3ab3f492c81d83b2c9e6dfe7a643e5ad201076949f63cc3b11d712a70f7fcb20894ae3aba03084c55bcbe90008258cbf1bc53d7373c7a2b6b9ee64ab941995f9b69f8592dd778e1f28ccd528ad8bf0cd686966ba95a6fead07173ff16fdc9ec8839fd8b2a40ea2f0494dbad91ee49bcb6cc14addc7b4f3b6fcfa232273d61370b11a8dd5b9be3e2fc47a7089f91202fd4b9c86a599bff373aacaaf2149d3da70df8d48dce4d42520fe2c9b3405794190c0377e4b5abf3aa71a39aada1186f7d9d1f8edfbb5609c05276583d974df23165b84c2038ac3a5067a523beb9f3d5400912971907a8d3e788eb4a5658c517ef3fd4239838162ff2469b05e05e346f45c9c6ec68ae1e69e2bdfa796c6af90126bd83f0e4100d21e4ae5481e0b231d3157338ae6acc56f6ad6e9926013660839232b4c734f29794f1446b8b1e41cbcdfcc4027be864d2e56628d41d02f9153b9829f9f7ec28e438f29ca987feb6cbe85439a7a826ecbc7fa08e25c14ed8fb560fc271c8686448a71e8f6becffd85a9899037a798d04eedfa0acae40b2be364493992e0f90b063a89646f25007e35dc4c7cd28a3ffcc77e9b5a62510b171e87e90a72ffc4e7e93ca361d6c2bd0fa60335b5fc45a792bc37ceb31c465f0a8dc5f2853339e0f9a559803b52975c92da872f99987ad241afeb22177568e344178008654a852c3538df4e9040c40074f38795184dd1e8d3e2f834d45338fc486d8ec3e3b8ca38b33acc9cbab4e0e671993947de06a2d0debacc100c87882f9c00c463a428dcaf5a93369196dd911e8041e7af549322fc982a780759ecd45a0b25683d76c5c288c979bd6c1a34ef304431dd90f435943247e011f6580faa7f252f526ba653100e21d198030ce0f504246c5bd5ea460ac727b6c950cdb4e0bfd7221168a455751b0c98f1a3b4f82f909f44785d00d91872d683945ab130454ead0a26a9b4e53844d4a2c62ba272a1427af3bd4f6da94ab168f58b2cecae909bdcf341cea17647236f46b0edcaad3f69d3e0a136a3a0c10e9ab7e48944b5c32156a5dc847a351f1f6c01a25fcce224892c17f2f1e7f39261110a5e004dbddbf906ed35175550cb1d43931d9f4f0dfd130ecf656795dba6c6ee13d7d2c31f38b95b50bd50a262c8a55aa15fd28a5ec373ceda55c4f5cd996c2ae8d2ae204b83f7abd2bfdbac96cda67dfb299d710a4ada3e511ac4dae58b4c69af18e94bc1cab5dfd54448683344d53219fe5cdba12eb5a24261a99f303abdd4913c6eed9e40086a2da57f0136ba5af1a006dd978666c4db9301dea9cb14fc693aee5331f5c85e21f3fdfbfd9f58da011a12bd244aaf30bb6c8f69442f68a60f9c9dce0efe878fd23054b9768930d0f6f2677422ab7e8e20857cd206490f18725c41bab8afb86b4c382adbc88399cc15d54048f96ab6425632f2585605741be7ea9cfdc11eed3ca8b301fc63e6b87a4a4dadbfd60f7aeb9f0a22ea149af75ed97b61d1bc956d08a1d3c1ea9acebc9f6b489412245b7ccb94e28056e81d35095446c37748f3", &(0x7f00000011c0)=""/139, 0xfffff1c9, 0x10017, 0x2}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r4 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = dup3(r1, r3, 0x0) r6 = openat$incfs(r1, &(0x7f0000001800)='.log\x00', 0x2002, 0x8) sendfile(r5, r6, &(0x7f0000001840)=0x7a67b35f, 0x2) clone3(&(0x7f00000016c0)={0xb94d200, &(0x7f0000000580)=0xffffffffffffffff, &(0x7f00000005c0), &(0x7f0000000600), {0x14}, &(0x7f0000000640)=""/18, 0x12, &(0x7f0000000680)=""/4096, &(0x7f0000001680)=[0x0, r4, r4, 0x0, r4, 0x0, 0x0], 0x7}, 0x58) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0xb, 0x0, 0xffffffffffffffff, r4}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) stat(&(0x7f00000000c0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r8, 0x0) chown(&(0x7f00000001c0)='./file1\x00', r8, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000018c0)={{0x1, 0x1, 0x18, r7, {r8, r2}}, './file1\x00'}) readv(0xffffffffffffffff, 0x0, 0x0) 13:35:08 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, 0x0, 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) [ 2041.200002] blktrace: Concurrent blktraces are not allowed on sg0 13:35:08 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:35:08 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, 0x0, 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:35:08 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:35:08 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, 0x0, 0x200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:35:23 executing program 6: getxattr(0x0, &(0x7f0000000580)=ANY=[], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:35:23 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0xc, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:35:23 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000440)=""/135, 0x87}], 0x1, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:35:23 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:35:23 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) clone3(&(0x7f00000004c0)={0x20004a00, &(0x7f0000000240), &(0x7f0000000340), &(0x7f0000000380), {0x1c}, &(0x7f00000003c0)=""/49, 0x31, &(0x7f0000000400)=""/82, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x9, {r0}}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 13:35:23 executing program 7: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:35:23 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x488, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:35:23 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:35:23 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) [ 2056.003578] Process accounting resumed 13:35:23 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x1c000, 0x10) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:35:23 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:35:23 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000440)=""/135, 0x87}], 0x1, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:35:23 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='net_cls.classid\x00', 0x2, 0x0) write$binfmt_script(r1, &(0x7f0000000100)={'#! ', './file0', [{0x20, '/dev/sg#\x00'}, {0x20, '/dev/sg#\x00'}, {0x20, '\x00'}, {0x20, '\x00'}, {}], 0xa, "18320ba3803619a1028dc165b64299ebe8a1458a9ee7cbc4e8344ffac0aede8e9287700377e09fb6febb3f97ce7a1bb400622860984be272e21e49a1158bfbdabd8ff8405b3f73116a13dc2534180748e0c793c84853feae89c77ba06d101276ad782fd3441cdd63ac4479c9a90232c9b042450510e61b9b5a2d78cbe6c9cd29ad9701481365ed60989abc9bbeb27ecc46806f35d27f6b9860126212cdaba2717ca658cd699365a93e2f30a99a0ef061f601f75cc3a6cfbd097b094bdcadac23751e0f"}, 0xe7) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:35:23 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x20, 0x26, 0x878c5bf8df414e27, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @fd}]}]}, 0x20}}, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:35:23 executing program 7: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be"], &(0x7f0000000340)=""/106, 0x6a) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:35:23 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 13:35:37 executing program 6: getxattr(0x0, &(0x7f0000000580)=ANY=[], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:35:37 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000440)=""/135, 0x87}], 0x1, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:35:37 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x7d, 0x40, 0x800, 0x1fffe, 0x8, r1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000540)={0x0, 0xfffffffffffffffc, 0x4d, 0x2, @scatter={0x5, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/61, 0x3d}, {&(0x7f0000000180)=""/7, 0x7}, {&(0x7f00000001c0)=""/148, 0x94}, {&(0x7f0000000280)=""/129, 0x81}, {&(0x7f0000000340)=""/4, 0x4}]}, &(0x7f0000000400)="3b9923a05a1d398cbcf07d73dcf362011f26806c8306df9c51edf4a134859ce7e799b94165381ff25efe5e00b0c19caf2fd565478903e2046e719267fe37b544bb837b421cfb00a16a85d6ced0", &(0x7f0000000480)=""/126, 0x3, 0x10, 0x2, &(0x7f0000000500)}) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x7b, 0x2, 0x1, 0x0, 0x0, 0x2, 0x110, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_config_ext={0x0, 0x4}, 0x44010, 0x80000001, 0x6, 0x7, 0x76, 0x3, 0x9, 0x0, 0x80000000, 0x0, 0x8}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) readv(0xffffffffffffffff, 0x0, 0x0) 13:35:37 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:35:37 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:35:37 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:35:37 executing program 7: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:35:37 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:35:37 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:35:37 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:35:37 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) sendfile(r1, r3, 0x0, 0x80000001) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x6000000a) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0xd0009411, &(0x7f0000000300)={{0x0, 0x8, 0x81, 0x0, 0x0, 0xffff, 0x1, 0x101, 0x5, 0x6, 0x7, 0x20, 0x40, 0x10000, 0x7fff}}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, &(0x7f0000001300)={0x0, r5, "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", "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"}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:35:37 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:35:37 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:35:38 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:35:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:35:53 executing program 7: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:35:53 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x5, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:35:53 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}, {&(0x7f0000000440)=""/135, 0x87}], 0x2, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:35:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:35:53 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1"], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:35:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x240880, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) 13:35:53 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) fallocate(r0, 0x0, 0x4, 0x20) 13:35:53 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 1) [ 2086.516533] FAULT_INJECTION: forcing a failure. [ 2086.516533] name failslab, interval 1, probability 0, space 0, times 0 [ 2086.519255] CPU: 1 PID: 12463 Comm: syz-executor.6 Not tainted 5.10.183 #1 [ 2086.520608] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2086.522225] Call Trace: [ 2086.522749] dump_stack+0x107/0x167 [ 2086.523471] should_fail.cold+0x5/0xa [ 2086.524214] ? alloc_pipe_info+0x10a/0x590 [ 2086.525038] should_failslab+0x5/0x20 [ 2086.525778] kmem_cache_alloc_trace+0x55/0x320 [ 2086.526678] alloc_pipe_info+0x10a/0x590 [ 2086.527486] splice_direct_to_actor+0x774/0x980 [ 2086.528393] ? _cond_resched+0x12/0x80 [ 2086.529198] ? inode_security+0x107/0x140 [ 2086.530003] ? pipe_to_sendpage+0x380/0x380 [ 2086.530878] ? selinux_file_permission+0x92/0x520 [ 2086.531843] ? do_splice_to+0x160/0x160 [ 2086.532659] ? security_file_permission+0x24e/0x570 [ 2086.533652] do_splice_direct+0x1c4/0x290 [ 2086.534502] ? splice_direct_to_actor+0x980/0x980 [ 2086.535465] ? selinux_file_permission+0x92/0x520 [ 2086.536459] ? security_file_permission+0x24e/0x570 [ 2086.537504] do_sendfile+0x553/0x1090 [ 2086.538297] ? do_pwritev+0x270/0x270 [ 2086.539075] ? wait_for_completion_io+0x270/0x270 [ 2086.540088] ? rcu_read_lock_any_held+0x75/0xa0 [ 2086.541034] ? vfs_write+0x354/0xa70 [ 2086.541808] __x64_sys_sendfile64+0x1d1/0x210 [ 2086.542727] ? __ia32_sys_sendfile+0x220/0x220 [ 2086.543675] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2086.544748] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2086.545806] do_syscall_64+0x33/0x40 [ 2086.546564] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2086.547611] RIP: 0033:0x7f612efb4b19 [ 2086.548371] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2086.552116] RSP: 002b:00007f612c52a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2086.553658] RAX: ffffffffffffffda RBX: 00007f612f0c7f60 RCX: 00007f612efb4b19 [ 2086.555105] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2086.556583] RBP: 00007f612c52a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2086.558028] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2086.559492] R13: 00007ffd9f25fb2f R14: 00007f612c52a300 R15: 0000000000022000 13:35:54 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x86) [ 2086.638801] Process accounting paused 13:35:54 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x6, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:35:54 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x93) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '/dev\'sg#\x00'}, {0x20, '\xec\xaa1\xea\xc9\xb0*\\%'}, {0x20, '\x00'}], 0xa, "d63efa3f78b76a2c16519d6d41d30dd72ec258c5f4406d68ff09b500010000000000c4100897ae1b972afdbc65eaeafaddaafcd4d87e030ba6f5deb7a056adce0243c3555fa4ba6c5247cb2ca5532b9149d79f94ff3354def3d777c612575c5153c0f492e39f8a430000d622f158869450d31101c2c68592024fab1da849b97bc78d02073870b7f78c5f86d85e24c1e589eb26584cf8925842b6c5faa84e508866dbfdabb04a5efb7e61df500a055f14aa4ff0b7a83080bbbd9c081abee994db3f99faa132fb3481debbc64973db6d39b8af6f24a529dea455a1b35ed2df007f3f9fc57332e9852c529a44e533857d0fb2f41aa14b3e2c7aacf851d109c9fe7338ada86596780c7aa9928c7b4ee2aa38d77e32aa4f744853f072676693102c3ab0810afbcdd51a713d51112cf8620b63c6d35d674c3d2c5890617695a8aab6ca28b9563bc07efb82184e7a549da2026052172b002feb32e5e067bb7f9591415fe0ad3b2f87b6a2ba465fd3ce89846f09cbf4f9bade5120b5a06d02d57ca610ae2206c1fdf11321eb6e758ea5a3659588d852387a1b57fd543bab801f2329f976ef35454f2965206d619a255418b836e45e83396f1ca89effb2f5903dedef992d723304a4ce0b194730d64be4b58348a2a8358599335953b480ad02c203f42517ed56d8741e"}, 0x206) 13:35:54 executing program 7: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (fail_nth: 1) 13:35:54 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 2) 13:35:54 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) 13:35:54 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1"], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) [ 2086.830520] FAULT_INJECTION: forcing a failure. [ 2086.830520] name failslab, interval 1, probability 0, space 0, times 0 [ 2086.833175] CPU: 0 PID: 12485 Comm: syz-executor.7 Not tainted 5.10.183 #1 [ 2086.834625] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2086.836364] Call Trace: [ 2086.836915] dump_stack+0x107/0x167 [ 2086.837677] should_fail.cold+0x5/0xa [ 2086.838476] ? getname_flags.part.0+0x50/0x4f0 [ 2086.839438] should_failslab+0x5/0x20 [ 2086.840231] kmem_cache_alloc+0x5b/0x310 [ 2086.841089] getname_flags.part.0+0x50/0x4f0 [ 2086.842011] getname+0x8e/0xd0 [ 2086.842683] do_sys_openat2+0xf9/0x420 [ 2086.843504] ? build_open_flags+0x6f0/0x6f0 [ 2086.844404] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2086.845393] ? wait_for_completion_io+0x270/0x270 [ 2086.846404] __x64_sys_openat+0x13f/0x1f0 [ 2086.847265] ? __ia32_sys_open+0x1c0/0x1c0 [ 2086.848144] ? ksys_write+0x1a9/0x260 [ 2086.848939] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2086.850035] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2086.851096] do_syscall_64+0x33/0x40 [ 2086.851885] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2086.852939] RIP: 0033:0x7feaffd8cb19 [ 2086.853708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2086.857501] RSP: 002b:00007feafd302188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2086.859089] RAX: ffffffffffffffda RBX: 00007feaffe9ff60 RCX: 00007feaffd8cb19 [ 2086.860557] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 2086.862024] RBP: 00007feafd3021d0 R08: 0000000000000000 R09: 0000000000000000 [ 2086.863503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2086.864974] R13: 00007fff04de8a2f R14: 00007feafd302300 R15: 0000000000022000 13:35:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:35:54 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:35:54 executing program 7: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (fail_nth: 2) [ 2087.032631] FAULT_INJECTION: forcing a failure. [ 2087.032631] name failslab, interval 1, probability 0, space 0, times 0 [ 2087.035489] CPU: 0 PID: 12496 Comm: syz-executor.6 Not tainted 5.10.183 #1 [ 2087.037186] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2087.039208] Call Trace: [ 2087.039860] dump_stack+0x107/0x167 [ 2087.040750] should_fail.cold+0x5/0xa [ 2087.041695] ? create_object.isra.0+0x3a/0xa20 [ 2087.042804] should_failslab+0x5/0x20 [ 2087.043730] kmem_cache_alloc+0x5b/0x310 [ 2087.044715] create_object.isra.0+0x3a/0xa20 [ 2087.045773] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2087.046999] kmem_cache_alloc_trace+0x151/0x320 [ 2087.048139] alloc_pipe_info+0x10a/0x590 [ 2087.049122] splice_direct_to_actor+0x774/0x980 [ 2087.050239] ? _cond_resched+0x12/0x80 [ 2087.051206] ? inode_security+0x107/0x140 [ 2087.052204] ? pipe_to_sendpage+0x380/0x380 [ 2087.053240] ? selinux_file_permission+0x92/0x520 [ 2087.054406] ? do_splice_to+0x160/0x160 [ 2087.055372] ? security_file_permission+0x24e/0x570 [ 2087.056585] do_splice_direct+0x1c4/0x290 [ 2087.057586] ? splice_direct_to_actor+0x980/0x980 [ 2087.058738] ? selinux_file_permission+0x92/0x520 [ 2087.059914] ? security_file_permission+0x24e/0x570 [ 2087.061134] do_sendfile+0x553/0x1090 [ 2087.062068] ? do_pwritev+0x270/0x270 [ 2087.062987] ? wait_for_completion_io+0x270/0x270 [ 2087.064170] ? rcu_read_lock_any_held+0x75/0xa0 [ 2087.065286] ? vfs_write+0x354/0xa70 [ 2087.066192] __x64_sys_sendfile64+0x1d1/0x210 [ 2087.067282] ? __ia32_sys_sendfile+0x220/0x220 [ 2087.068388] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2087.069668] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2087.070918] do_syscall_64+0x33/0x40 [ 2087.071817] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2087.073035] RIP: 0033:0x7f612efb4b19 [ 2087.073921] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2087.078316] RSP: 002b:00007f612c52a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2087.080139] RAX: ffffffffffffffda RBX: 00007f612f0c7f60 RCX: 00007f612efb4b19 [ 2087.081835] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2087.083540] RBP: 00007f612c52a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2087.085239] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2087.086936] R13: 00007ffd9f25fb2f R14: 00007f612c52a300 R15: 0000000000022000 [ 2087.163120] FAULT_INJECTION: forcing a failure. [ 2087.163120] name failslab, interval 1, probability 0, space 0, times 0 [ 2087.165393] CPU: 1 PID: 12502 Comm: syz-executor.7 Not tainted 5.10.183 #1 [ 2087.166734] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2087.168363] Call Trace: [ 2087.168879] dump_stack+0x107/0x167 [ 2087.169591] should_fail.cold+0x5/0xa [ 2087.170334] ? create_object.isra.0+0x3a/0xa20 [ 2087.171246] should_failslab+0x5/0x20 [ 2087.171999] kmem_cache_alloc+0x5b/0x310 [ 2087.172782] create_object.isra.0+0x3a/0xa20 [ 2087.173627] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2087.174605] kmem_cache_alloc+0x159/0x310 [ 2087.175428] getname_flags.part.0+0x50/0x4f0 [ 2087.176266] getname+0x8e/0xd0 [ 2087.176874] do_sys_openat2+0xf9/0x420 [ 2087.177613] ? build_open_flags+0x6f0/0x6f0 [ 2087.178427] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2087.179367] ? wait_for_completion_io+0x270/0x270 [ 2087.180289] __x64_sys_openat+0x13f/0x1f0 [ 2087.181072] ? __ia32_sys_open+0x1c0/0x1c0 [ 2087.181870] ? ksys_write+0x1a9/0x260 [ 2087.182600] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2087.183619] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2087.184605] do_syscall_64+0x33/0x40 [ 2087.185312] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2087.186280] RIP: 0033:0x7feaffd8cb19 [ 2087.186988] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2087.190539] RSP: 002b:00007feafd302188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2087.192023] RAX: ffffffffffffffda RBX: 00007feaffe9ff60 RCX: 00007feaffd8cb19 [ 2087.193387] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 2087.194752] RBP: 00007feafd3021d0 R08: 0000000000000000 R09: 0000000000000000 [ 2087.196122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2087.197467] R13: 00007fff04de8a2f R14: 00007feafd302300 R15: 0000000000022000 [ 2087.229898] attempt to access beyond end of device [ 2087.229898] loop6: rw=2049, want=404, limit=158 13:36:09 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) 13:36:09 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:36:09 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1"], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:36:09 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 3) 13:36:09 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}, {&(0x7f0000000440)=""/135, 0x87}], 0x2, 0x5, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:36:09 executing program 7: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (fail_nth: 3) 13:36:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:36:09 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x1) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) syz_io_uring_setup(0x4d4f, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x2, 0x0, r3, 0x0, 0x0}, 0x4) syz_io_uring_submit(0x0, r2, &(0x7f0000000100)=@IORING_OP_NOP={0x0, 0x1}, 0x5) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r0, 0x8008f511, &(0x7f0000000000)) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) [ 2102.331829] blktrace: Concurrent blktraces are not allowed on sg0 [ 2102.374831] FAULT_INJECTION: forcing a failure. [ 2102.374831] name failslab, interval 1, probability 0, space 0, times 0 [ 2102.377463] CPU: 1 PID: 12509 Comm: syz-executor.6 Not tainted 5.10.183 #1 [ 2102.379109] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2102.381043] Call Trace: [ 2102.381680] dump_stack+0x107/0x167 [ 2102.382619] should_fail.cold+0x5/0xa [ 2102.383540] ? alloc_pipe_info+0x1e5/0x590 [ 2102.384528] should_failslab+0x5/0x20 [ 2102.385413] __kmalloc+0x72/0x390 [ 2102.386215] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2102.387440] alloc_pipe_info+0x1e5/0x590 [ 2102.388373] splice_direct_to_actor+0x774/0x980 [ 2102.389490] ? _cond_resched+0x12/0x80 [ 2102.390361] ? inode_security+0x107/0x140 [ 2102.391270] ? pipe_to_sendpage+0x380/0x380 [ 2102.392335] ? selinux_file_permission+0x92/0x520 [ 2102.393430] ? do_splice_to+0x160/0x160 [ 2102.394433] ? security_file_permission+0x24e/0x570 [ 2102.395590] do_splice_direct+0x1c4/0x290 [ 2102.396576] ? splice_direct_to_actor+0x980/0x980 [ 2102.397625] ? selinux_file_permission+0x92/0x520 [ 2102.398659] ? security_file_permission+0x24e/0x570 [ 2102.399737] do_sendfile+0x553/0x1090 [ 2102.400578] ? do_pwritev+0x270/0x270 [ 2102.401385] ? wait_for_completion_io+0x270/0x270 [ 2102.402456] ? rcu_read_lock_any_held+0x75/0xa0 [ 2102.403513] ? vfs_write+0x354/0xa70 [ 2102.404356] __x64_sys_sendfile64+0x1d1/0x210 [ 2102.405311] ? __ia32_sys_sendfile+0x220/0x220 [ 2102.406292] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2102.407415] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2102.408518] do_syscall_64+0x33/0x40 [ 2102.409314] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2102.410410] RIP: 0033:0x7f612efb4b19 [ 2102.411257] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2102.415243] RSP: 002b:00007f612c52a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2102.416905] RAX: ffffffffffffffda RBX: 00007f612f0c7f60 RCX: 00007f612efb4b19 [ 2102.418518] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2102.420082] RBP: 00007f612c52a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2102.421646] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2102.423180] R13: 00007ffd9f25fb2f R14: 00007f612c52a300 R15: 0000000000022000 [ 2102.443403] FAULT_INJECTION: forcing a failure. [ 2102.443403] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2102.444697] CPU: 0 PID: 12520 Comm: syz-executor.7 Not tainted 5.10.183 #1 [ 2102.445436] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2102.446342] Call Trace: [ 2102.446634] dump_stack+0x107/0x167 [ 2102.447024] should_fail.cold+0x5/0xa [ 2102.447451] strncpy_from_user+0x34/0x470 [ 2102.447902] getname_flags.part.0+0x95/0x4f0 [ 2102.448378] getname+0x8e/0xd0 [ 2102.448725] do_sys_openat2+0xf9/0x420 [ 2102.449149] ? build_open_flags+0x6f0/0x6f0 [ 2102.449612] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2102.450124] ? wait_for_completion_io+0x270/0x270 [ 2102.450646] __x64_sys_openat+0x13f/0x1f0 [ 2102.451097] ? __ia32_sys_open+0x1c0/0x1c0 [ 2102.451549] ? ksys_write+0x1a9/0x260 [ 2102.451975] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2102.452545] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2102.453121] do_syscall_64+0x33/0x40 [ 2102.453531] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2102.454091] RIP: 0033:0x7feaffd8cb19 [ 2102.454496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2102.456516] RSP: 002b:00007feafd302188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2102.457354] RAX: ffffffffffffffda RBX: 00007feaffe9ff60 RCX: 00007feaffd8cb19 [ 2102.458140] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 2102.458916] RBP: 00007feafd3021d0 R08: 0000000000000000 R09: 0000000000000000 [ 2102.459709] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2102.460497] R13: 00007fff04de8a2f R14: 00007feafd302300 R15: 0000000000022000 13:36:09 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:36:09 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 4) 13:36:09 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) 13:36:09 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) sendfile(r1, r3, 0x0, 0x80000001) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f0000000000)={{r4}, {@void, @actul_num={@void, 0x400, 0x6b}}}) readv(0xffffffffffffffff, 0x0, 0x0) 13:36:09 executing program 7: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (fail_nth: 4) 13:36:09 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}, {&(0x7f0000000440)=""/135, 0x87}], 0x2, 0x0, 0x58) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:36:09 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:36:10 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2102.682553] FAULT_INJECTION: forcing a failure. [ 2102.682553] name failslab, interval 1, probability 0, space 0, times 0 [ 2102.683808] CPU: 0 PID: 12543 Comm: syz-executor.7 Not tainted 5.10.183 #1 [ 2102.684542] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2102.685435] Call Trace: [ 2102.685725] dump_stack+0x107/0x167 [ 2102.686115] should_fail.cold+0x5/0xa [ 2102.686525] ? __alloc_file+0x21/0x320 [ 2102.686951] should_failslab+0x5/0x20 [ 2102.687374] kmem_cache_alloc+0x5b/0x310 [ 2102.687824] __alloc_file+0x21/0x320 [ 2102.688223] alloc_empty_file+0x6d/0x170 [ 2102.688666] path_openat+0xe3/0x26f0 [ 2102.689072] ? path_lookupat+0x860/0x860 [ 2102.689508] ? perf_trace_lock+0xac/0x490 [ 2102.689948] ? SOFTIRQ_verbose+0x10/0x10 [ 2102.690384] ? __lockdep_reset_lock+0x180/0x180 [ 2102.690881] do_filp_open+0x190/0x3e0 [ 2102.691285] ? may_open_dev+0xf0/0xf0 [ 2102.691711] ? __alloc_fd+0x2b8/0x630 [ 2102.692132] ? lock_downgrade+0x6d0/0x6d0 [ 2102.692587] ? do_raw_spin_lock+0x121/0x260 [ 2102.693051] ? rwlock_bug.part.0+0x90/0x90 [ 2102.693525] ? _raw_spin_unlock+0x1a/0x30 [ 2102.693976] ? __alloc_fd+0x2b8/0x630 [ 2102.694401] do_sys_openat2+0x171/0x420 [ 2102.694829] ? build_open_flags+0x6f0/0x6f0 [ 2102.695309] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2102.695846] ? wait_for_completion_io+0x270/0x270 [ 2102.696381] __x64_sys_openat+0x13f/0x1f0 [ 2102.696835] ? __ia32_sys_open+0x1c0/0x1c0 [ 2102.697303] ? ksys_write+0x1a9/0x260 [ 2102.697730] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2102.698306] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2102.698880] do_syscall_64+0x33/0x40 [ 2102.699280] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2102.699855] RIP: 0033:0x7feaffd8cb19 [ 2102.700270] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2102.702283] RSP: 002b:00007feafd302188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2102.703126] RAX: ffffffffffffffda RBX: 00007feaffe9ff60 RCX: 00007feaffd8cb19 [ 2102.703925] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 2102.704704] RBP: 00007feafd3021d0 R08: 0000000000000000 R09: 0000000000000000 [ 2102.705480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2102.706266] R13: 00007fff04de8a2f R14: 00007feafd302300 R15: 0000000000022000 [ 2102.724582] FAULT_INJECTION: forcing a failure. [ 2102.724582] name failslab, interval 1, probability 0, space 0, times 0 [ 2102.725883] CPU: 0 PID: 12547 Comm: syz-executor.6 Not tainted 5.10.183 #1 [ 2102.726633] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2102.727529] Call Trace: [ 2102.727816] dump_stack+0x107/0x167 [ 2102.728219] should_fail.cold+0x5/0xa [ 2102.728656] ? create_object.isra.0+0x3a/0xa20 [ 2102.729145] should_failslab+0x5/0x20 [ 2102.729554] kmem_cache_alloc+0x5b/0x310 [ 2102.729997] create_object.isra.0+0x3a/0xa20 [ 2102.730464] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2102.731075] __kmalloc+0x16e/0x390 [ 2102.731465] alloc_pipe_info+0x1e5/0x590 [ 2102.731905] splice_direct_to_actor+0x774/0x980 [ 2102.732400] ? _cond_resched+0x12/0x80 [ 2102.732817] ? inode_security+0x107/0x140 [ 2102.733263] ? pipe_to_sendpage+0x380/0x380 [ 2102.733719] ? selinux_file_permission+0x92/0x520 [ 2102.734235] ? do_splice_to+0x160/0x160 [ 2102.734660] ? security_file_permission+0x24e/0x570 [ 2102.735207] do_splice_direct+0x1c4/0x290 [ 2102.735661] ? splice_direct_to_actor+0x980/0x980 [ 2102.736186] ? selinux_file_permission+0x92/0x520 [ 2102.736721] ? security_file_permission+0x24e/0x570 [ 2102.737273] do_sendfile+0x553/0x1090 [ 2102.737701] ? do_pwritev+0x270/0x270 [ 2102.738111] ? wait_for_completion_io+0x270/0x270 [ 2102.738647] ? rcu_read_lock_any_held+0x75/0xa0 [ 2102.739146] ? vfs_write+0x354/0xa70 [ 2102.739576] __x64_sys_sendfile64+0x1d1/0x210 [ 2102.740067] ? __ia32_sys_sendfile+0x220/0x220 [ 2102.740571] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2102.741145] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2102.741704] do_syscall_64+0x33/0x40 [ 2102.742115] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2102.742664] RIP: 0033:0x7f612efb4b19 [ 2102.743062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2102.745109] RSP: 002b:00007f612c52a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2102.745938] RAX: ffffffffffffffda RBX: 00007f612f0c7f60 RCX: 00007f612efb4b19 [ 2102.746718] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2102.747524] RBP: 00007f612c52a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2102.748304] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2102.749080] R13: 00007ffd9f25fb2f R14: 00007f612c52a300 R15: 0000000000022000 [ 2102.766683] attempt to access beyond end of device [ 2102.766683] loop6: rw=2049, want=404, limit=158 13:36:26 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}, {&(0x7f0000000440)=""/135, 0x87}], 0x2, 0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:36:26 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, 0x0, 0x86) 13:36:26 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)=0xffffffc1, 0x4) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/241, 0xf1}, {&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/142, 0x8e}, {&(0x7f00000003c0)=""/184, 0xb8}, {&(0x7f0000000480)=""/108, 0x6c}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x7, &(0x7f0000001580)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000001600), 0x6e, &(0x7f0000001800)=[{&(0x7f0000001680)=""/73, 0x49}, {&(0x7f0000001700)=""/61, 0x3d}, {&(0x7f0000001740)=""/143, 0x8f}], 0x3, &(0x7f0000001840)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001880), 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001900)=""/232, 0xe8}, {&(0x7f0000001a00)=""/223, 0xdf}], 0x2, &(0x7f0000001b40)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x110}}], 0x3, 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:36:26 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 5) 13:36:26 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:36:26 executing program 7: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (fail_nth: 5) 13:36:26 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:36:26 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 2119.320046] blktrace: Concurrent blktraces are not allowed on sg0 [ 2119.330138] FAULT_INJECTION: forcing a failure. [ 2119.330138] name failslab, interval 1, probability 0, space 0, times 0 [ 2119.332456] CPU: 1 PID: 12573 Comm: syz-executor.7 Not tainted 5.10.183 #1 [ 2119.333838] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2119.335489] Call Trace: [ 2119.336028] dump_stack+0x107/0x167 [ 2119.336761] should_fail.cold+0x5/0xa [ 2119.337527] ? create_object.isra.0+0x3a/0xa20 [ 2119.338441] should_failslab+0x5/0x20 [ 2119.339218] kmem_cache_alloc+0x5b/0x310 [ 2119.340060] create_object.isra.0+0x3a/0xa20 [ 2119.340940] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2119.341960] kmem_cache_alloc+0x159/0x310 [ 2119.342795] __alloc_file+0x21/0x320 [ 2119.343547] alloc_empty_file+0x6d/0x170 [ 2119.344405] path_openat+0xe3/0x26f0 [ 2119.345167] ? path_lookupat+0x860/0x860 [ 2119.345994] ? perf_trace_lock+0xac/0x490 [ 2119.346825] ? SOFTIRQ_verbose+0x10/0x10 [ 2119.347656] ? __lockdep_reset_lock+0x180/0x180 [ 2119.348606] do_filp_open+0x190/0x3e0 [ 2119.349369] ? may_open_dev+0xf0/0xf0 [ 2119.350138] ? __alloc_fd+0x2b8/0x630 [ 2119.350154] Process accounting resumed [ 2119.350902] ? lock_downgrade+0x6d0/0x6d0 [ 2119.350929] ? do_raw_spin_lock+0x121/0x260 [ 2119.353409] ? rwlock_bug.part.0+0x90/0x90 [ 2119.354273] ? _raw_spin_unlock+0x1a/0x30 [ 2119.355100] ? __alloc_fd+0x2b8/0x630 [ 2119.355884] do_sys_openat2+0x171/0x420 [ 2119.356684] ? build_open_flags+0x6f0/0x6f0 [ 2119.357550] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2119.358517] ? wait_for_completion_io+0x270/0x270 [ 2119.359490] __x64_sys_openat+0x13f/0x1f0 [ 2119.360324] ? __ia32_sys_open+0x1c0/0x1c0 [ 2119.361173] ? ksys_write+0x1a9/0x260 [ 2119.361945] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2119.362994] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2119.364043] do_syscall_64+0x33/0x40 [ 2119.364791] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2119.365817] RIP: 0033:0x7feaffd8cb19 [ 2119.366566] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2119.370248] RSP: 002b:00007feafd302188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2119.371778] RAX: ffffffffffffffda RBX: 00007feaffe9ff60 RCX: 00007feaffd8cb19 [ 2119.373209] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 2119.374648] RBP: 00007feafd3021d0 R08: 0000000000000000 R09: 0000000000000000 [ 2119.376090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2119.377515] R13: 00007fff04de8a2f R14: 00007feafd302300 R15: 0000000000022000 [ 2119.382770] FAULT_INJECTION: forcing a failure. 13:36:26 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x581001, 0xb4) fcntl$notify(r1, 0x402, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) sendfile(r1, r3, 0x0, 0x80000001) sendmsg$NFT_MSG_GETSET(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="600000000a0a0300000000000000000500000208000f400000000808000a40000000030c001040000000010073797a3100000000080005400000003ef90035000000001408000a40000000030c000b40000000000000000953e3fca545e43a55eb057ea41ef6fffb160900000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x240c0081) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) readv(0xffffffffffffffff, 0x0, 0x0) [ 2119.382770] name failslab, interval 1, probability 0, space 0, times 0 [ 2119.385242] CPU: 1 PID: 12567 Comm: syz-executor.6 Not tainted 5.10.183 #1 [ 2119.386629] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2119.388284] Call Trace: [ 2119.388818] dump_stack+0x107/0x167 [ 2119.389552] should_fail.cold+0x5/0xa [ 2119.390318] ? iter_file_splice_write+0x16d/0xc30 [ 2119.391284] should_failslab+0x5/0x20 [ 2119.392059] __kmalloc+0x72/0x390 [ 2119.392762] iter_file_splice_write+0x16d/0xc30 [ 2119.393686] ? atime_needs_update+0x600/0x600 [ 2119.394598] ? generic_splice_sendpage+0x140/0x140 [ 2119.395584] ? pipe_to_user+0x170/0x170 [ 2119.396375] ? _cond_resched+0x12/0x80 [ 2119.397155] ? avc_policy_seqno+0x9/0x70 [ 2119.397962] ? selinux_file_permission+0x92/0x520 [ 2119.398932] ? lockdep_init_map_type+0x2c7/0x780 [ 2119.399891] ? generic_splice_sendpage+0x140/0x140 [ 2119.400873] direct_splice_actor+0x10f/0x170 [ 2119.401756] splice_direct_to_actor+0x387/0x980 [ 2119.402696] ? pipe_to_sendpage+0x380/0x380 [ 2119.403564] ? do_splice_to+0x160/0x160 [ 2119.404378] ? security_file_permission+0x24e/0x570 [ 2119.405392] do_splice_direct+0x1c4/0x290 [ 2119.406220] ? splice_direct_to_actor+0x980/0x980 [ 2119.407184] ? selinux_file_permission+0x92/0x520 [ 2119.408156] ? security_file_permission+0x24e/0x570 [ 2119.409171] do_sendfile+0x553/0x1090 [ 2119.409947] ? do_pwritev+0x270/0x270 [ 2119.410710] ? wait_for_completion_io+0x270/0x270 [ 2119.411689] ? rcu_read_lock_any_held+0x75/0xa0 [ 2119.412619] ? vfs_write+0x354/0xa70 [ 2119.413371] __x64_sys_sendfile64+0x1d1/0x210 [ 2119.414274] ? __ia32_sys_sendfile+0x220/0x220 [ 2119.415188] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2119.416251] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2119.417285] do_syscall_64+0x33/0x40 [ 2119.418031] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2119.419052] RIP: 0033:0x7f612efb4b19 [ 2119.419804] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2119.423463] RSP: 002b:00007f612c52a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2119.424984] RAX: ffffffffffffffda RBX: 00007f612f0c7f60 RCX: 00007f612efb4b19 [ 2119.426419] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2119.427865] RBP: 00007f612c52a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2119.429285] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2119.430708] R13: 00007ffd9f25fb2f R14: 00007f612c52a300 R15: 0000000000022000 [ 2119.479431] blktrace: Concurrent blktraces are not allowed on sg0 13:36:26 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:36:26 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, 0x0, 0x86) 13:36:26 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:36:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, 0x0, 0x86) 13:36:27 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:36:40 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}, {&(0x7f0000000440)=""/135, 0x87}], 0x2, 0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:36:40 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:36:40 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:36:40 executing program 7: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (fail_nth: 6) 13:36:40 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, r3, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:36:40 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:36:40 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 6) 13:36:40 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) [ 2133.604456] FAULT_INJECTION: forcing a failure. [ 2133.604456] name failslab, interval 1, probability 0, space 0, times 0 [ 2133.605854] CPU: 1 PID: 12616 Comm: syz-executor.6 Not tainted 5.10.183 #1 [ 2133.606731] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2133.607909] Call Trace: [ 2133.608230] dump_stack+0x107/0x167 [ 2133.608670] should_fail.cold+0x5/0xa [ 2133.609195] ? create_object.isra.0+0x3a/0xa20 [ 2133.609745] should_failslab+0x5/0x20 [ 2133.610201] kmem_cache_alloc+0x5b/0x310 [ 2133.610679] ? igrab+0xc0/0xc0 [ 2133.611057] create_object.isra.0+0x3a/0xa20 [ 2133.611569] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2133.612293] __kmalloc+0x16e/0x390 [ 2133.612716] iter_file_splice_write+0x16d/0xc30 [ 2133.613264] ? atime_needs_update+0x600/0x600 [ 2133.613811] ? generic_splice_sendpage+0x140/0x140 [ 2133.614416] ? pipe_to_user+0x170/0x170 [ 2133.615035] ? _cond_resched+0x12/0x80 [ 2133.615565] ? avc_policy_seqno+0x9/0x70 [ 2133.616049] ? selinux_file_permission+0x92/0x520 [ 2133.616701] ? lockdep_init_map_type+0x2c7/0x780 [ 2133.617334] ? generic_splice_sendpage+0x140/0x140 [ 2133.617995] direct_splice_actor+0x10f/0x170 [ 2133.618538] splice_direct_to_actor+0x387/0x980 [ 2133.619095] ? pipe_to_sendpage+0x380/0x380 [ 2133.619633] ? do_splice_to+0x160/0x160 [ 2133.620113] ? security_file_permission+0x24e/0x570 [ 2133.620847] do_splice_direct+0x1c4/0x290 [ 2133.621351] ? splice_direct_to_actor+0x980/0x980 [ 2133.621982] ? selinux_file_permission+0x92/0x520 [ 2133.622549] ? security_file_permission+0x24e/0x570 [ 2133.623260] do_sendfile+0x553/0x1090 [ 2133.623712] ? do_pwritev+0x270/0x270 [ 2133.624272] ? wait_for_completion_io+0x270/0x270 [ 2133.624862] ? rcu_read_lock_any_held+0x75/0xa0 [ 2133.625507] ? vfs_write+0x354/0xa70 [ 2133.626069] __x64_sys_sendfile64+0x1d1/0x210 [ 2133.626618] ? __ia32_sys_sendfile+0x220/0x220 [ 2133.627210] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2133.627913] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2133.628639] do_syscall_64+0x33/0x40 [ 2133.629136] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2133.629869] RIP: 0033:0x7f612efb4b19 [ 2133.630313] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2133.632645] RSP: 002b:00007f612c52a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2133.633536] RAX: ffffffffffffffda RBX: 00007f612f0c7f60 RCX: 00007f612efb4b19 [ 2133.634411] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2133.635275] RBP: 00007f612c52a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2133.636152] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2133.637012] R13: 00007ffd9f25fb2f R14: 00007f612c52a300 R15: 0000000000022000 [ 2133.639869] FAULT_INJECTION: forcing a failure. [ 2133.639869] name failslab, interval 1, probability 0, space 0, times 0 [ 2133.642315] CPU: 0 PID: 12608 Comm: syz-executor.7 Not tainted 5.10.183 #1 [ 2133.643801] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2133.645575] Call Trace: [ 2133.646142] dump_stack+0x107/0x167 [ 2133.646927] should_fail.cold+0x5/0xa [ 2133.647771] ? security_file_alloc+0x34/0x170 [ 2133.648739] should_failslab+0x5/0x20 [ 2133.649555] kmem_cache_alloc+0x5b/0x310 [ 2133.650444] security_file_alloc+0x34/0x170 [ 2133.651370] __alloc_file+0xb6/0x320 [ 2133.652178] alloc_empty_file+0x6d/0x170 [ 2133.653047] path_openat+0xe3/0x26f0 [ 2133.653859] ? path_lookupat+0x860/0x860 [ 2133.654722] ? perf_trace_lock+0xac/0x490 [ 2133.655612] ? SOFTIRQ_verbose+0x10/0x10 [ 2133.656499] ? __lockdep_reset_lock+0x180/0x180 [ 2133.657503] do_filp_open+0x190/0x3e0 [ 2133.658313] ? may_open_dev+0xf0/0xf0 [ 2133.659130] ? __alloc_fd+0x2b8/0x630 [ 2133.659945] ? lock_downgrade+0x6d0/0x6d0 [ 2133.660832] ? do_raw_spin_lock+0x121/0x260 [ 2133.661202] attempt to access beyond end of device [ 2133.661202] loop6: rw=2049, want=404, limit=158 [ 2133.661747] ? rwlock_bug.part.0+0x90/0x90 [ 2133.663780] ? _raw_spin_unlock+0x1a/0x30 [ 2133.664664] ? __alloc_fd+0x2b8/0x630 [ 2133.665492] do_sys_openat2+0x171/0x420 [ 2133.666345] ? build_open_flags+0x6f0/0x6f0 [ 2133.667265] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2133.668323] ? wait_for_completion_io+0x270/0x270 [ 2133.669365] __x64_sys_openat+0x13f/0x1f0 [ 2133.670252] ? __ia32_sys_open+0x1c0/0x1c0 [ 2133.671150] ? ksys_write+0x1a9/0x260 [ 2133.671977] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2133.673100] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2133.674228] do_syscall_64+0x33/0x40 [ 2133.675026] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2133.676123] RIP: 0033:0x7feaffd8cb19 [ 2133.676916] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2133.680823] RSP: 002b:00007feafd302188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2133.682439] RAX: ffffffffffffffda RBX: 00007feaffe9ff60 RCX: 00007feaffd8cb19 [ 2133.683964] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 2133.685472] RBP: 00007feafd3021d0 R08: 0000000000000000 R09: 0000000000000000 [ 2133.686986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2133.688501] R13: 00007fff04de8a2f R14: 00007feafd302300 R15: 0000000000022000 13:36:41 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 7) 13:36:41 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:36:41 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) 13:36:41 executing program 7: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (fail_nth: 7) [ 2133.847002] FAULT_INJECTION: forcing a failure. [ 2133.847002] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 2133.848457] CPU: 1 PID: 12628 Comm: syz-executor.6 Not tainted 5.10.183 #1 [ 2133.849272] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2133.850236] Call Trace: [ 2133.850544] dump_stack+0x107/0x167 [ 2133.850961] should_fail.cold+0x5/0xa [ 2133.851436] __alloc_pages_nodemask+0x182/0x600 [ 2133.852002] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2133.852720] ? find_get_entry+0x2c8/0x740 [ 2133.853197] alloc_pages_current+0x187/0x280 [ 2133.853718] __page_cache_alloc+0x2d2/0x360 [ 2133.854211] pagecache_get_page+0x2c7/0xc80 [ 2133.854724] ? perf_trace_lock+0xac/0x490 [ 2133.855197] grab_cache_page_write_begin+0x64/0xa0 [ 2133.855793] cont_write_begin+0x448/0x980 [ 2133.856269] ? fat_add_cluster+0x100/0x100 [ 2133.856776] ? nobh_write_begin+0xed0/0xed0 [ 2133.857267] ? __mark_inode_dirty+0x93b/0xd40 [ 2133.857780] ? lock_downgrade+0x6d0/0x6d0 [ 2133.858271] ? do_raw_spin_lock+0x121/0x260 [ 2133.858762] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2133.859369] fat_write_begin+0x89/0x180 [ 2133.859825] ? fat_add_cluster+0x100/0x100 [ 2133.860329] generic_perform_write+0x20a/0x4f0 [ 2133.860854] ? fat_direct_IO+0x1ef/0x380 [ 2133.861338] ? page_cache_next_miss+0x310/0x310 [ 2133.861877] __generic_file_write_iter+0x2cd/0x5d0 [ 2133.862464] generic_file_write_iter+0xdb/0x230 [ 2133.862996] do_iter_readv_writev+0x476/0x750 [ 2133.863533] ? new_sync_write+0x660/0x660 [ 2133.864012] ? selinux_file_permission+0x92/0x520 [ 2133.864584] do_iter_write+0x191/0x670 [ 2133.865038] ? trace_hardirqs_on+0x5b/0x180 [ 2133.865562] vfs_iter_write+0x70/0xa0 [ 2133.865994] iter_file_splice_write+0x762/0xc30 [ 2133.866551] ? generic_splice_sendpage+0x140/0x140 [ 2133.867125] ? avc_policy_seqno+0x9/0x70 [ 2133.867594] ? selinux_file_permission+0x92/0x520 [ 2133.868184] ? lockdep_init_map_type+0x2c7/0x780 [ 2133.868744] ? generic_splice_sendpage+0x140/0x140 [ 2133.869365] direct_splice_actor+0x10f/0x170 [ 2133.870005] splice_direct_to_actor+0x387/0x980 [ 2133.870582] ? pipe_to_sendpage+0x380/0x380 [ 2133.871084] ? do_splice_to+0x160/0x160 [ 2133.871585] ? security_file_permission+0x24e/0x570 [ 2133.872175] do_splice_direct+0x1c4/0x290 [ 2133.872688] ? splice_direct_to_actor+0x980/0x980 [ 2133.873265] ? selinux_file_permission+0x92/0x520 13:36:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) sendto$unix(r1, &(0x7f00000002c0)="08d1581b3b64b553aa004bdebf4599b1ce6884b45659255dbcdfa7c5a43225aea5ac77c79c182e47a674c708535dbcbc49dc34a88cf0521e03b963c938a8bc0e4325436e1dc5076414e6871d70dbd9e7eb45a751bd18a850dd71507fac959637ca9ec2c5ddf5e96fc57a3c39f6bbcbc5e04ae8578f314ae247cca9859ee442631cfe709a3af8e72b004a2ea52d2671c13818c35f7090f300b247f553917549b71215ffd1161d1022ba", 0xa9, 0x4000010, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0x1, 0x8, 0x3}) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000100)={0x84, 0x81, 0x7fffffff, "969e1a70c62e69e2f8c72d96692097b9c63e3e4bf88f51d2635fcbce4d029f408c39c32f994a0aff428b8a1a0de495a7a960f4afa416443b7052d78e613d945d4f75e3a9a0dde19f915a837414866cf5d1d74589dc20aa3c39fd8dc1825d052055df03b7458f4d5d94b43a2ae3a81883c63f1c339dd1c7bd3c0213b060d11f1381005771"}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r2, 0xc010f508, &(0x7f0000000200)={0x8, 0x6365}) io_uring_enter(r2, 0x45e2, 0x1ee3, 0x3, &(0x7f00000001c0)={[0x5]}, 0x8) [ 2133.873867] ? security_file_permission+0x24e/0x570 [ 2133.874704] do_sendfile+0x553/0x1090 [ 2133.875173] ? do_pwritev+0x270/0x270 [ 2133.875631] ? wait_for_completion_io+0x270/0x270 [ 2133.876230] ? rcu_read_lock_any_held+0x75/0xa0 [ 2133.876779] ? vfs_write+0x354/0xa70 [ 2133.877206] __x64_sys_sendfile64+0x1d1/0x210 [ 2133.877704] ? __ia32_sys_sendfile+0x220/0x220 [ 2133.878265] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2133.878864] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2133.879470] do_syscall_64+0x33/0x40 [ 2133.879894] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2133.880517] RIP: 0033:0x7f612efb4b19 [ 2133.880958] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2133.883118] RSP: 002b:00007f612c52a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2133.884060] RAX: ffffffffffffffda RBX: 00007f612f0c7f60 RCX: 00007f612efb4b19 [ 2133.884946] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2133.885819] RBP: 00007f612c52a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2133.886686] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2133.887551] R13: 00007ffd9f25fb2f R14: 00007f612c52a300 R15: 0000000000022000 [ 2133.904947] FAULT_INJECTION: forcing a failure. [ 2133.904947] name failslab, interval 1, probability 0, space 0, times 0 [ 2133.906295] CPU: 1 PID: 12635 Comm: syz-executor.7 Not tainted 5.10.183 #1 [ 2133.907214] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2133.908189] Call Trace: [ 2133.908532] dump_stack+0x107/0x167 [ 2133.908941] should_fail.cold+0x5/0xa [ 2133.909369] ? create_object.isra.0+0x3a/0xa20 [ 2133.909922] should_failslab+0x5/0x20 [ 2133.910350] kmem_cache_alloc+0x5b/0x310 [ 2133.910838] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 2133.911452] create_object.isra.0+0x3a/0xa20 [ 2133.911994] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2133.912561] kmem_cache_alloc+0x159/0x310 [ 2133.913084] security_file_alloc+0x34/0x170 [ 2133.913564] __alloc_file+0xb6/0x320 [ 2133.914027] alloc_empty_file+0x6d/0x170 [ 2133.914481] path_openat+0xe3/0x26f0 [ 2133.914949] ? path_lookupat+0x860/0x860 [ 2133.915421] ? perf_trace_lock+0xac/0x490 [ 2133.915901] ? SOFTIRQ_verbose+0x10/0x10 [ 2133.916405] ? __lockdep_reset_lock+0x180/0x180 [ 2133.916927] do_filp_open+0x190/0x3e0 [ 2133.917390] ? may_open_dev+0xf0/0xf0 [ 2133.917812] ? __alloc_fd+0x2b8/0x630 [ 2133.918282] ? lock_downgrade+0x6d0/0x6d0 [ 2133.918757] ? do_raw_spin_lock+0x121/0x260 [ 2133.919256] ? rwlock_bug.part.0+0x90/0x90 [ 2133.919772] ? _raw_spin_unlock+0x1a/0x30 [ 2133.920219] ? __alloc_fd+0x2b8/0x630 [ 2133.920698] do_sys_openat2+0x171/0x420 [ 2133.921143] ? build_open_flags+0x6f0/0x6f0 [ 2133.921681] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2133.922218] ? wait_for_completion_io+0x270/0x270 [ 2133.922813] __x64_sys_openat+0x13f/0x1f0 [ 2133.923282] ? __ia32_sys_open+0x1c0/0x1c0 [ 2133.923813] ? ksys_write+0x1a9/0x260 [ 2133.924243] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2133.924880] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2133.925457] do_syscall_64+0x33/0x40 [ 2133.925913] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2133.926493] RIP: 0033:0x7feaffd8cb19 [ 2133.926905] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2133.929030] RSP: 002b:00007feafd302188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2133.929903] RAX: ffffffffffffffda RBX: 00007feaffe9ff60 RCX: 00007feaffd8cb19 [ 2133.930747] RDX: 0000000000000000 RSI: 0000000020000040 RDI: ffffffffffffffff [ 2133.931586] RBP: 00007feafd3021d0 R08: 0000000000000000 R09: 0000000000000000 13:36:41 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c7171"], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) [ 2133.932436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2133.933414] R13: 00007fff04de8a2f R14: 00007feafd302300 R15: 0000000000022000 13:36:41 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:36:41 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:36:57 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000900)=ANY=[]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file0\x00', 0x0) 13:36:57 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:36:57 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0xc, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:36:57 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 8) 13:36:57 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}, {&(0x7f0000000440)=""/135, 0x87}], 0x2, 0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:36:57 executing program 7: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (fail_nth: 8) 13:36:57 executing program 5: ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7fc00}}, './file0\x00'}) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:36:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) [ 2149.658467] FAULT_INJECTION: forcing a failure. [ 2149.658467] name failslab, interval 1, probability 0, space 0, times 0 [ 2149.659809] CPU: 0 PID: 12661 Comm: syz-executor.6 Not tainted 5.10.183 #1 [ 2149.660585] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2149.661473] Call Trace: [ 2149.661765] dump_stack+0x107/0x167 [ 2149.662161] should_fail.cold+0x5/0xa [ 2149.662568] ? create_object.isra.0+0x3a/0xa20 [ 2149.663060] should_failslab+0x5/0x20 [ 2149.663467] kmem_cache_alloc+0x5b/0x310 [ 2149.663906] create_object.isra.0+0x3a/0xa20 [ 2149.664387] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2149.664936] kmem_cache_alloc+0x159/0x310 [ 2149.665385] alloc_buffer_head+0x20/0x110 [ 2149.665831] alloc_page_buffers+0x14d/0x700 [ 2149.666303] create_empty_buffers+0x2c/0x640 [ 2149.666781] create_page_buffers+0x1bb/0x230 [ 2149.667256] __block_write_begin_int+0x1d1/0x19c0 [ 2149.667779] ? fat_add_cluster+0x100/0x100 [ 2149.668253] ? add_to_page_cache_locked+0x40/0x40 [ 2149.668772] ? __page_cache_alloc+0x10d/0x360 [ 2149.669259] ? remove_inode_buffers+0x300/0x300 [ 2149.669756] ? pagecache_get_page+0x243/0xc80 [ 2149.670243] ? perf_trace_lock+0xac/0x490 [ 2149.670727] ? wait_for_stable_page+0x92/0xe0 [ 2149.671239] cont_write_begin+0x472/0x980 [ 2149.671689] ? fat_add_cluster+0x100/0x100 [ 2149.672192] ? nobh_write_begin+0xed0/0xed0 [ 2149.672685] ? __mark_inode_dirty+0x93b/0xd40 [ 2149.673198] ? lock_downgrade+0x6d0/0x6d0 [ 2149.673673] ? do_raw_spin_lock+0x121/0x260 [ 2149.674178] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2149.674764] fat_write_begin+0x89/0x180 [ 2149.675218] ? fat_add_cluster+0x100/0x100 [ 2149.675710] generic_perform_write+0x20a/0x4f0 [ 2149.676211] ? fat_direct_IO+0x1ef/0x380 [ 2149.676675] ? page_cache_next_miss+0x310/0x310 [ 2149.677215] __generic_file_write_iter+0x2cd/0x5d0 [ 2149.677774] generic_file_write_iter+0xdb/0x230 [ 2149.678305] do_iter_readv_writev+0x476/0x750 [ 2149.678823] ? new_sync_write+0x660/0x660 [ 2149.679293] ? selinux_file_permission+0x92/0x520 [ 2149.679855] do_iter_write+0x191/0x670 [ 2149.680320] ? trace_hardirqs_on+0x5b/0x180 [ 2149.680790] vfs_iter_write+0x70/0xa0 [ 2149.681238] iter_file_splice_write+0x762/0xc30 [ 2149.681779] ? generic_splice_sendpage+0x140/0x140 [ 2149.682348] ? avc_policy_seqno+0x9/0x70 [ 2149.682811] ? selinux_file_permission+0x92/0x520 [ 2149.683364] ? lockdep_init_map_type+0x2c7/0x780 [ 2149.683899] ? generic_splice_sendpage+0x140/0x140 [ 2149.684466] direct_splice_actor+0x10f/0x170 [ 2149.684972] splice_direct_to_actor+0x387/0x980 [ 2149.685474] ? pipe_to_sendpage+0x380/0x380 [ 2149.685972] ? do_splice_to+0x160/0x160 [ 2149.686423] ? security_file_permission+0x24e/0x570 [ 2149.687002] do_splice_direct+0x1c4/0x290 [ 2149.687483] ? splice_direct_to_actor+0x980/0x980 [ 2149.688046] ? selinux_file_permission+0x92/0x520 [ 2149.688594] ? security_file_permission+0x24e/0x570 [ 2149.689168] do_sendfile+0x553/0x1090 [ 2149.689610] ? do_pwritev+0x270/0x270 [ 2149.690042] ? wait_for_completion_io+0x270/0x270 [ 2149.690598] ? rcu_read_lock_any_held+0x75/0xa0 [ 2149.691123] ? vfs_write+0x354/0xa70 [ 2149.691546] __x64_sys_sendfile64+0x1d1/0x210 [ 2149.692117] ? __ia32_sys_sendfile+0x220/0x220 [ 2149.692627] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2149.693216] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2149.693777] do_syscall_64+0x33/0x40 [ 2149.694208] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2149.694754] RIP: 0033:0x7f612efb4b19 [ 2149.695178] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2149.697148] RSP: 002b:00007f612c52a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2149.698012] RAX: ffffffffffffffda RBX: 00007f612f0c7f60 RCX: 00007f612efb4b19 [ 2149.698772] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2149.699586] RBP: 00007f612c52a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2149.700410] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2149.701212] R13: 00007ffd9f25fb2f R14: 00007f612c52a300 R15: 0000000000022000 [ 2149.715254] FAULT_INJECTION: forcing a failure. [ 2149.715254] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2149.716561] CPU: 0 PID: 12664 Comm: syz-executor.7 Not tainted 5.10.183 #1 [ 2149.717334] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2149.718229] Call Trace: [ 2149.718516] dump_stack+0x107/0x167 [ 2149.718910] should_fail.cold+0x5/0xa [ 2149.719326] _copy_to_user+0x2e/0x180 [ 2149.719749] simple_read_from_buffer+0xcc/0x160 [ 2149.720256] proc_fail_nth_read+0x198/0x230 [ 2149.720723] ? proc_sessionid_read+0x230/0x230 [ 2149.721213] ? security_file_permission+0x24e/0x570 [ 2149.721748] ? perf_trace_initcall_start+0x101/0x380 [ 2149.722302] ? proc_sessionid_read+0x230/0x230 [ 2149.722820] vfs_read+0x228/0x580 [ 2149.723218] ksys_read+0x12d/0x260 [ 2149.723610] ? vfs_write+0xa70/0xa70 [ 2149.724043] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2149.724620] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2149.725212] do_syscall_64+0x33/0x40 [ 2149.725639] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2149.726212] RIP: 0033:0x7feaffd3f69c [ 2149.726634] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2149.728676] RSP: 002b:00007feafd302170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2149.729531] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007feaffd3f69c [ 2149.730320] RDX: 000000000000000f RSI: 00007feafd3021e0 RDI: 0000000000000004 [ 2149.731134] RBP: 00007feafd3021d0 R08: 0000000000000000 R09: 0000000000000000 [ 2149.731945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2149.732745] R13: 00007fff04de8a2f R14: 00007feafd302300 R15: 0000000000022000 13:36:57 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2149.791745] Process accounting paused 13:36:57 executing program 7: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:36:57 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}, {&(0x7f0000000440)=""/135, 0x87}], 0x2, 0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:36:57 executing program 0: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:36:57 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:36:57 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:36:57 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) chown(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) r1 = getpid() newfstatat(0xffffffffffffff9c, &(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) r3 = clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f00000016c0)={0xb94d200, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600), {0x14}, &(0x7f0000000640)=""/18, 0x12, &(0x7f0000000680)=""/4096, &(0x7f0000001680)=[0x0, r3, r3, 0x0, r3, 0x0, 0x0], 0x7}, 0x58) r4 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000015c0)='io.pressure\x00', 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000001900)={{0x1, 0x1, 0x18, r0, {0x537c}}, './file0\x00'}) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001b80)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r7, r8, 0x0, 0x20d315) r9 = getpgrp(0x0) r10 = gettid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004a00)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000004900)=[{&(0x7f0000000100)={0x1148, 0x42, 0x300, 0x70bd2a, 0x25dfdbfd, "", [@typed={0x14, 0x55, 0x0, 0x0, @ipv6=@private0}, @typed={0x8, 0x19, 0x0, 0x0, @u32=0x8000}, @typed={0x14, 0x38, 0x0, 0x0, @ipv6=@loopback}, @nested={0x1107, 0x40, 0x0, 0x1, [@generic="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", @generic="d4a45e1711e5856f82b2592be4309db7b5082f0c42e6f0abe7b2a25ecfefdc0c3c605bfaf9a71c00619dafc346aab5dd5ad053c9296be1b1b513994221e5d4cd5d15fd0b7fcfdf6046df7b6a221e72e9ba1c2ad7bd226de6d6830ed2f2803469b527ed050f29aa0999af441a6b57d8f81b8f3c15e37800ca03a03b82ba179b", @generic="23cadcd13fbfbd7771606e0ba08d2eb9539c4f36464a3d4b92b9842452d4134d35b5cca9c5b8c36c2eb091d33b3fda89b07ed7336aa3ea8430a7e66b6e3573ac3de1e8c9dbf220dea27ab317cf9ae5cc395274964019e520757c7422f9783032f98e9499658942dc00b475a364f08b18a7c4529110780a0ecee2d03edc25fb82c909a535", @generic]}]}, 0x1148}, {&(0x7f0000001340)={0x218, 0x2c, 0x4, 0x70bd2a, 0x25dfdbfc, "", [@generic="07931ebd19a99376d2c5e85d2f3a9c5b9b5ad299314123eefc2a990ab46a1e6bab6c3f4b3845b22cea93ac91e65a7dbb8ada2d740eecad6fa333589562f86ef499719095ccb565a1d9bee60b7814597b064a07bd4aab0ef12b3edb", @typed={0x8, 0x30, 0x0, 0x0, @uid}, @typed={0x8, 0x64, 0x0, 0x0, @pid=r1}, @nested={0x19a, 0x73, 0x0, 0x1, [@generic="c51be1cf539ef5dd96761b301573d21951dc3d13f6e8cb055ad077a426444a19784caa1f517e10d498505f5b3f156e83c7d214046713bb4ff44e8a1e446aa44d41bbc64bdc3acf0b1218c5d2adb74c2cf7513fe71c808b6d232c2d6c7597b59a416d630580d3630d2744286430c7dc481606ab909c0305999b9be5fe96b682ba94f4f7826e8507d9471a47811127834c2ee15d27aad937725036144705", @typed={0x8, 0x4, 0x0, 0x0, @uid=r2}, @generic="1843e9b96aa4dfc2a2405c2bce38542125729f37daa7e9d90eab7e40944374cbcf6c69cff896b5b1de77109b566e7ed40f6819edea", @typed={0x4, 0x19}, @typed={0xd, 0x20, 0x0, 0x0, @str='/dev/sg#\x00'}, @typed={0x8, 0xb, 0x0, 0x0, @pid=r3}, @generic="236788107c20233d38980a45f84ffbd7e988649c214d9c1d5dcd4e40a5e08315a4054b4d5f57153a85db4d3187af7aea14b07ceaa77da0c077e9814aa49f45b4396f63ee38fcb1663e3647240ef18c72542066fe72206d67e4924deabd2bacea85077ee37a98fa40452d18aa860953890265e72468fa5a4384b5035fbfbc8461f5619e9845dc09229f59ffa9b9a1f6b2df7a50421a2b72e5461d97bf9e9424c5"]}]}, 0x218}, {&(0x7f0000001580)={0x28, 0x2c, 0x4, 0x70bd2a, 0x25dfdbfc, "", [@generic="556638e5f4f290ba91a3630d9280a9db879c18875cfc76"]}, 0x28}, {&(0x7f0000001600)={0x2ec, 0x26, 0x8, 0x70bd26, 0x25dfdbfc, "", [@generic="864d19c174c5d5a9f54283d5a5d35ebc25f89cf9ae24c0f331f375f3e44fba72debb598bdf4eebc0f568b0c5f145af3884ebcba263d4331a6dcf81ef7837e22e24decf3958cf1ad04a5dd90dba1a9342eaf6f35643a30ca2e2e96f11732eff8e20562ac1774ac78b2449371de63da6e284590143411dd563a75a237a0cf1f3460666a2f8e765c5969d2d6d9e8559b652865f1a390da2278697860ddb49bd54b0da2db685f96629c4081e1201f35a914e2db469e9e273b67cef78ecb00e2b90e2835f", @generic="8bef5e8ed58275c7196371faa9353cd00a3cbf654cfec7e4b8ece6f744d1c1f0360f80ab8ff90c27cfb62d3336d0d4066f4a94d2c44444b77a447a43f88831dd3429222efd66d0fb45c7814f7e", @nested={0xc, 0x22, 0x0, 0x1, [@typed={0x8, 0x69, 0x0, 0x0, @ipv4=@local}]}, @generic="0222d4b40f747e4e0bdbfb91593ff4a2686a362f676010ad5cef5d098c5e7b4a7d6adc8222f1618183e3e66a233838958b1a5bde531f2dc61f22081bb8264f8af740b325146b152741a6046c27e386659afd078f8f7c2d78e1dffec83d79a3c1f07b5374d10c43365da4571fd0fd56973a99899dfbdb2437fdc443236ecb463c4c82", @typed={0x8, 0x1b, 0x0, 0x0, @ipv4=@rand_addr=0x64010101}, @typed={0xc, 0x7f, 0x0, 0x0, @u64=0x2}, @nested={0x126, 0x34, 0x0, 0x1, [@generic="5b9f96da685018c887ec57c78e718dddaa244c1232513bf290d517a3e76d4a52f986220ab63080397ab009c320974769a204dfe93bc7d231d3e91ba3fcfe0444737a4025da95145c6652982ab915cd79d33bf4cb735dd59893c3e1efe2543ea9c6f84bf17fdd9b3a4cecd39ca43e72072a7a00003ee7ddd476ac4a87b04fe5c9643edea258cce6a4055889bac9e05d313284c87f9f4650213b120757d52b040ae3831f0111d4617ed80797491c5f6871313c61dbc3a9eafdf9d05836ab6c9d81912ad4238fa257a1106a5f71b313e74c8b91dc2caa9ebd0da70e377123fdeb9d660dfa21b383fd93698de9e2f5c09d15fb5c7b8e3d29", @typed={0x6, 0x24, 0x0, 0x0, @str='*\x00'}, @typed={0x4, 0x82}, @typed={0x8, 0x53, 0x0, 0x0, @u32=0x5}, @typed={0x8, 0x64, 0x0, 0x0, @fd=r4}, @typed={0x8, 0x76, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x6a, 0x0, 0x0, @u32=0x3}]}]}, 0x2ec}, {&(0x7f0000004a40)={0x244, 0x30, 0x200, 0x70bd2a, 0x25dfdbfd, "", [@typed={0x14, 0x6f, 0x0, 0x0, @ipv6=@local}, @generic="3e46ac7580fb243522187b2171893db07c168be28700df8bad072db8372e768f236c59d398f1891002d1dc676cc83cd35647ec57d9e59527b61aeb6eacf615f123db84f7d583aaeba97267e66f2f4cd864dd30af2af0987287e3dd1a330e8dc9aa3f396ef911c57b25371303eb0a0b6ba27689987207855fc2a77b2c7a1a59823fefbc7e90b08e851099189a32a8142627e5631987a4e0627a983d6a1c158a852ac85da9e1a78af12fb3392c4b2f8310aa4fb641f378e6ed392709d2afc35fc3532901ebc1d70d2763534e108ab39a", @typed={0x4, 0x3b}, @nested={0x8a, 0x7a, 0x0, 0x1, [@typed={0x8, 0x8d, 0x0, 0x0, @fd=r5}, @generic="989da2932ca49845a03a10f2aff55470ede5e6124910da6cd169541d3573ff78a9b70c12c96f592d703d30fb182d4bdc67aaaf1aa8ccf336de8a347af01b58c91004c2fb9528330db19e63081cdbf7", @generic="88afe6e50029120521ac46d81fc49747b1860b0ed2d8d2fce8796c07fcff1c2331acca67ef5f0c", @typed={0x8, 0x27, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x29}}]}, @generic="7322e053d14f5009bdb0234f5a1bf044c375d29b2bf4c7dd47d233cef49a", @generic="ccffe1a6378bd09887189456478bd66728072b0fb5bb895818b944f9804daf799ded122d531feeccf1da7b9ae17cf1506ca674e9fb498ca3821939e683c811030e6011e75349e256d56feb2b031c7806b9f01e65643266e80bb57456cfbca7c701cf745ac1da1e2d52a44632758bf1118702f0c2299afa379df387d2cf96b8da1c05fb8b809ac7d9ee76dbafc41d7879dd92b00efe33e5cbbd7247fffd7b505db2"]}, 0x244}, {&(0x7f0000001bc0)={0x230, 0x1a, 0x100, 0x70bd29, 0x25dfdbfb, "", [@nested={0x14f, 0x26, 0x0, 0x1, [@generic="827638e68bc9a4aa239e2c91d4065aa157dfc2412673ffcabee03d1b820a3c54f321c764452a3dcbc17e4665fbe18ba8472f9e9a306ce839829a2313b5acaf647d1e8a231d28b0ddfbda46189942c651024f5851518c5f1b2efbbfc6f4fb8f43dd6b87d20e3b45693fa76e78710be096f92b910a776106bf0f1ba45db2ca677d526d27a873", @generic="7b0468d467819ecd950caaa66a366c294ab093b676925a6cb64a47a3950029d946098539e1817ba631f44d991975db50004ddd35759a20413ac795595d57d43b9232df16ddc087b185f2953b69dc5f8e4db3b31ea118e982cf53c16179e6d7d617cf370c8d9eaeba3afd3f558033e6bd4e25b9792200a5db883eee19c9847b7508ea4e9fb609028ef254e08d04c03da323cd5538a39e76b3cec71df23d3e", @typed={0x5, 0x7b, 0x0, 0x0, @str='\x00'}, @typed={0x8, 0x2a, 0x0, 0x0, @u32=0x697}, @typed={0x10, 0x39, 0x0, 0x0, @str='io.pressure\x00'}, @typed={0x8, 0x95, 0x0, 0x0, @fd=r8}]}, @nested={0xcd, 0x67, 0x0, 0x1, [@typed={0x8, 0x28, 0x0, 0x0, @fd=r6}, @generic="45b7b507a9f33162821dece4fc8c3d7e09a2b4cd292c7df9b18af7ec11cf2532bb4f96fff4ac0cb53da26a50849fc168837fcbd7eaae98de4a1679a20135f125515b271c206e4323d218446c71349e2e8d90789ecc2ee75e73b5bf74d609fc86ec52fd9b", @generic="0c53f64119b85cff0b7ff9e0efa78c4b1f0c2674ebab4d160d5de4c0f8b07db78a1a42bf5e48d4d2618245758636902f85c2438b992f908a8c22a13b1c2bcfe6dad716d57e5e08c6b7d224f6c51e958b3657c240407854200a0a1239d5"]}]}, 0x230}, {&(0x7f0000001f00)={0x1190, 0x1b, 0x300, 0x70bd2a, 0x25dfdbfb, "", [@nested={0x1180, 0x84, 0x0, 0x1, [@typed={0x14, 0x49, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @generic="2624f5626f69ac0868840b404d92a71651e50ad73acbdecaafc840ba5f5754293c5ca3e7f0046bc850211908553d1674f39c385327ec0a48ec6875709b5de57de79b9749c2d0863c2c734647274f0a30f4d3a936f17381021c9e2212888a7e359862496fcbf98a9ea6e1aec607ffb84705e0b06e39a6fc3c33d0d9dbd772e47b24048cb421c0765b33ec95f90cfdcd7e2e62a270174634de614baf7306c006d8af47855a70139de24e07336e578ce3f05fc4ba1c64c8b17b1e6ecf46d624603d1bc519d8df1289c69aef4e0ca5dc96c9920c0e843f8f308e173e18f2a0a9c71feb43c4fc10dabbaf12f0e88b23761b42160ed5", @generic="bf5d", @generic="5bfb98e127297cde2c0e68a6092f90e2bf507057404536f24f", @generic="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", @generic="b627f5296ed394da35d00b51aaefd26bca2883bb80bc9ab7015930ce93633334aa1b1e60944d0533db0852e847e07038c7a1b2a205cd0f0362e86fb07739d3d4c04955b0cb68f895400632f53478f3f9b6be4644840ed47ef1e6"]}]}, 0x1190}, {&(0x7f00000030c0)={0x28, 0x32, 0x8, 0x70bd27, 0x25dfdbff, "", [@typed={0xc, 0x4d, 0x0, 0x0, @u64=0x5}, @typed={0xc, 0x81, 0x0, 0x0, @u64=0x3ff}]}, 0x28}, {&(0x7f0000006080)=ANY=[@ANYBLOB="2c1300001c0002002bbd7000fedbdf2508009600", @ANYRES32, @ANYBLOB="04001b00140053800d0031007b2b2a7d263a3a5e0000000039028e800d0031002f6400102f7367230000000041000600aa5ad1a15748ddd258695d819f773d639abfe55657d6b478351842f5e0023c01114057a4195d7f7d724f6c6212fcb1bf2eadfaf96904511ebc87435bf900000008005100", @ANYRES32=0xee01, @ANYBLOB="04004c000700650023fb8d7848ee7b17989faa1858a2e6b73ee915c620831b61de031070806d9453578e6e26ae5e540179cd5c1ffad5451d5a60e1f23789eb80383efa66d5896f4d21528a716103cfda2a061666b1bbcfdd1c4c7b0b77756655a933a2d6eb9c15da1c1e992071896151c139e6e13966affc6ee3c5281ad107163705c3167cc06fa97c2c3d9f62c53bd62f9fe3c2b7406b666eaae84fbf6aca38949822891c24277fb1e347bc243ca10dd26227a3524bc9cfde41f30e5d0c3739da65014f9729322a8013eb7e4f2d8ace1c3f3ecddd25347bae6a95b16b4fea7690a3dfea062fb869c4fd14a752186c9953d6c0898fd96c9eda1a94016e5c8bcdcc19e9b1b58c90e4e131a7fd7e9ddf37b160a7f2345932cf0c692f0c1e7371f6692484f26f1182f393554a748a1e9e37d50200cdfb97f745dbaec33cab297280377ea0ad8d9bd1aa1158c09541098c6b24a71883f804338bed1ab184ef5aa41080544f6d71f01a9857d369522125d08a4ff4ca3bce303f4957c7bbb549e6f0916d9bf2502a8f9c3247afad99b17a9a82f089e5a49035f6d5a275d216fac1131eecf093f15c9cad683528adc0ad5c387cea0ada57dd7a48d5b71a3e67e9c7a3aa1b4cb03ec4951aea6206001d002a00000077518022dc117e7a0000000800460000000000a2d06d11af9a0b11913a5a487530c4748e92c91ab0516ccf091bfbf10c31aa4160ae194dea00f2346320d5a02f539cd45d87eb9361cf6aba36c91f5dd3a1a400e8bf1c00b33aae56acf0d46c896db0f06d6da78ea522cb21938361d579e6c34adce129fb85c13654d197eea7f391abd3dc96c91d8e05bd68233a07ab5b06e1b9daefcb312435410abc881d935c9f66f7b61bbd2f16430f8b42e010ab8b718e6ad09a2ed1f07501587af832c5e3bf6736a645d80400190068861fb474fb136846407b8f2922ad84e482fcacada85b43053498ebe8fcc163fdf93d9317199488096e17f6c4fb4dcb2f91ec884abc67ca6e252185e9ad8c71818ec0603b291f8d35ef43de4073d73e5d5d5b0a398a683e2181c5cba37fb2a003f83c467b04f8b0f96fea7c368d28cdcf59979c830ac4050832df743b7ed75f0e9921d04f153c66a1148f11356d4d8e85173580add92748ca846edc031972efe40a4438ee665ec8f4f2da5fc6dbbd7397fbc4cc48d9c39d1502e8b43c8e856fe2ed15a9182d4e9936044f79e9d05c0a440a8a83b48ba27b15baf2c7e7a1977a8e2cf06eab7d3682e72b65dc375e5b9aa871fdf037f96ead82e72a3407e61159ce2015316128416f8c49feb0273b6b4e0332c1ede5b3456a2f02f6c47619b41a1fd6d2273c4adba2f2b3ce4a66827eb2ece39dcec90eef37fedb8511b7d81a39bbc2834824f8249cf21be6cfe1222a767b5ce69eda83fed6a873562da5e41ef38a0e9b20a05375cbd0f632bccaf000eb6fed942a9d65aba08c180447e63e057a4ef135a81afeb97f5c5586f5dd23e442f8ef2366a82026ef087282a0c1d0795f1fc0717ef5dd9d9cd65d4e888d548542f9000535441f109f28a30b2849c7cdf2d6b7d064fb9b7697fb9dee7c160cf93fa5ac0d727dbad24e81f5214f2d237eb3b634def70d223b92e88262806c096cb80d118ec6e89240815ec8546162f994af6c405fa4e4c9a5428919b147c20da47a7d0827c18d6709fa4a7b142fd45d7c750b8c50544a85193d204bbf25dbba29405d00e77eb3add845728de1a03adc83d72ce51563b1897525dd4388c6129052eae17b3291f03cb10448811e50b0e13192fc9b105a9aeeec44172303804f5368027587bb49c8fb967a0068e11ab88c53fde4ac81ab4431edb50fa30ec842330a340c3a7a806482c827a47eda70a26a9565d0b94f5e8fc7ad5cde4c50c314980ed6bc7acbab085e1cbf1e9c28f10840f5883b3546813a3cd00a0f132041b572959d4b6e53546fbfa07ecadb1129faee6b07d8c77c5c88ba207463110657bc7bb104caecb48cd1356a0517565f6699dff951c351497c2c465a357339281b3c1f6c2baa300ca77ea766bb4571ceeed6477c866892b23fefdc0040ff99f5fe003167c180960f05e0ec002ef81312a6c67234b76c4d6e92fbe930bf71d86918fe96762c482ad64d5c2036f80d087890ac24e9200af7ac93b932ac3e4e4631458b1c2f35c5be88f60edf591c470de87a99046d88d948aff893a39d892dceb3479d373e40e1817a4bba3369ec9194b5c6a05d6dc6f78f829f79891fbb438a4dbc92cde011c1b65729e18e9e56cf3579f6a7328c99e5589b6bfe7d2aecb55058f3e2082b6476cf60e3e7e6dd5c23135a0780bbece38f81176e52283ffdd351d0ef4dde3064f6fb2e247cafa929e6e6b1c82736dad0c43c6aaa6a6ed1406265dfedba1f21f251c9878d9c3de683d97f6171e20a1243e37b950743f43f625833eee4facf87223275052ffac12a823520e923217ee41ef55f8e1d271b7fe8b15a947fb0332a42c8fa1356253c6b8e88c53acb119245e36da8cfbb160263c011be503b9e509f662832b83afbc32cf7ba627506a208923bc11613d27b271d79680632c334c344cb88c0c662a66ce910160f6eee23200e6b26f6e42cd430584630195ac857f3474f412a2073dc2a8d673d61dbfe9dc360ddacd210f117ced3b57ad3b5c8490f350120a1a2636795f82a55966b117f35060f11f87ba415d49becff32dc9d3b8beff81d09027cf01b50e37badc1735ae344001e465abeec2a0b877537a9c660360c964b8fe77309862ef0dd8b57e72db0a75c28974ac1ca6c48f597f9c017e477a75db237cf04c7e373093d6a5de8d265d75fe9aed18eea1a358e933c77a69ed383af0aaaec5f529220963e11c12d5ea984ed931277409d8072dec8b0e177eb7ebef013794f4e637dbda832e0ac26831ad607f9db71a716fc032c91af6175380ac912d1d11bf3be7b56158d7aacf936697bb018f753c24cd62b5ae980276d849a4d5796fc43414d0b28654ea8aa07ed41135247eebddaa58968dbad6fa7661accf8269c35c81ed170ea1ac3624d4fccb7980f49d0993507041f26f909de0848be76e7908c4335d77ec12c81b5f97dfaa851e788a0a97b0510d7946ec96953403af406b776703b4c8a80dbbdee2d51f8eccff2efe7fbe6f13373e341357e3af058151d2c887b31a8a8c86b09f20041d2d15a36dfc9a5222d06e1475a0e59abc702cace5b17d34e3d94431b7545049fdc78a447eb755556ce24d383fc1dfe7b4d7f9cd6b61ba0147d83034b5d2922c381fdc2a16ba9819243a2df15dc20c4a6f60a3d087dff0b6c69417e384c7ad382f41d28bf7260ee430e3e63087021f95c2c61ab44ab2b4e79ffb765b420234c39ffca7dbaff65b85a44b0cb3a249ee348588ca83c84ff28b99dd280223e23754a6fac08ba3caf074346eeea5220f6268212118221d010333fa2f115353567f7012957299cde75b817652fc5f146dc7d507042f89311a81385a5937714f54ac70617a018a1d8c867880a1f40faae72b776602eeef093914a627ce95ec979ac47fe6ff6672616a82c90064394c89ee58f3bccc2ca7840e145963d7dea5cf41b81b38e0c03e914b5d5bf78491cb9521f0b65d5e90ff0d7d2e85eddfc14b00f54052b2cf4dcc56e01dd6a81c5799b441e40063b295b74d93bae4876b6ac1d803a09960cce6a26b74f8df5869ecf1175c420715677cc336a5ebf40d52fd5a219314f5706b14e3f56236cebf971962d64019a53b8beba91344fb41bd70159fd1ad0c567632e94a117f6a73fb5a1fe11d29f99ad5538bfda8b58a3c6bf9d0378cdcdef5deb8dc29a1823d37f16ce4bfeb65dd47b9c77afc09922b706228e951499f1e36b9283943f82cf83b80f0e6f24839db0e2d310c6b4d6a1e639f9f43a035dfcc1842ef93d38c02dc752679b0f57d257b590bce6def8b259dd040fc870167e97638ae41ea95218ea5c4ba6141159255e6fc1ee8312ba5f84f1224af925d9a780700452a4dbfed7d2b8d99151df56e68d8ef5834112094de93385334a31828d455f13d896603a3d7e5ddb4e57fd062bd9e5d199d79cc63e8b9dcb89caba45577963fdeafabfb7a8bfb58e65a8b3d1bf17ad9cd7a288055af638e96ffdbcf35686c51c357a60263bb5e1f7bdb617361dde76bb71a03712a12262108033da4b8ca5228dcb7df8313a7a9bb10422a5749ac72a1cbe96d16dc6679dd2377b826c220297d4451a31ae26517cfbb6eec8b9b27d3a3bf73ac0193fab88218b9030ae48f9e8208fdbca0364dee52d27e4475bf9847ed395b01a0d48f36d69437cd145bfc959dee7e682bd6e6b714333d4b9b6f2fce8d3ccddb1bbfb2b6f01df1d2907a3ed6586620725eb82c60cfb428af4d44b5ef7d03240946f8f223434c3ef1a59032d8cfeeceb6828b17a7a3ac8a713d0671c802cd5a30ea11b83159b5839b4f222ac8d74dd9cc0b17b144a1615a6830d6462de38e6f9ea978a911d928a7a59c226c543d991b467f6073761b9afe8980111978d014591ee3962e9fe58ad6ad497712775838adbc7ef612e18e9af50454f0fad17790597b16290f9bb71e1d9c4bfa5e91f31ce0dd5289132529643cea8e66ebc3a4f9300ac66fdda6d53fd10ebe28978e49d6a8cdcd70fe7ea3dc289a1034ee1a73d594eb5565b07a5a4cb2b5c1529e9e26961574b32311c7383378f7b87a29444f65597a61cdf267194d1c8e853a8d5677b57611c338a7ee47f0f4e42ada554cf399629bcfb8d690005f07c8e52d00ce225ca70785548e4cbe41b818f7e8a0239be9167caa7654a7ff6278b78cfbbb06a92d951926e7cf8ef561f356d36950f3a7f2b8dd46731ddc2f8c169426baee46ad03f50b5bac61ba3bdb5e03bbc7403e16a254671ab6697a5cc2cb8bfc44db0ab70ff7156f80e5a26a2067afff9a2b469959cc973aa0173c54f59214587201a95ab84d65286f6d456122f1ec91cc29300c1ff6d34d870c9f326e71bdfd12b0a154709c10034563ea29e7dfa72f76a719cd42ea9716f72bb5180f0d0f6b9a9c6709ff6dc5306a00033c41299ceeeabfeb9fc9d8939698a108746cc6e5c2228829a829bd0e2115fb5177b5cde129f700f40fc8ba68d745e15602c20d9729627e938d788d64fe077d5e47ec14909c0b818a11806b60b96a52e67885386f2d2b25fbcf0b08d509e7442fb3af153fb7aaed9d97135c7b618d1831ddbd8e64269791f040eca8984a59971723288e39e772e9efec3d36cdcb3a7b284cb6e305b75851c16b1d242c79d8009a646e8b0cd5b1d86649e93acfecbd5ab1ad71d1ac5150f483877f9ffa8ac91fb5d5cd9eb3fd8129a7357d249192c17ab3b4d1a678082ccaa2c01d397fb351e01b82d89d019387f95deadb8303784be31059200ac125ba7bab6ece4dbc0ea75096cb411e98b689a838b2f45e0fc85d4add55b5645ec643279a7a06a5ac388fc8abced43a7dbb020396d7d0c14b57f7ceb92ef8b43c95062f9b1434a6c4ecacdadcbb787277f166153464d0072b9b942cf2117afddbc8df7479328bb9afb01ec3cd4846879f886a47b480f9886f5cbf5d65f2fc470387a8afc1c87178996efaffa3f196841e6485af5ae56dfd76caa6f0aeac7cfdf583a4702e5eb758b29249872979f4dfeafe678bedaa8199de92ce700ffcdd16080890b87183eef251b7bc3c501390d8b515a2549c76305cd66d98954f31fc61b56edbc7c6ab2a88704e048ba68f12e5523f586ad155248454261cdc3cde5e5499566e82b06de1e0f2846dee4d30b0dffa6b40f114f53b55786c15d3b58c6d55671ab822f2f0f069866f3592bc005791f61aef8333ba70e9e323352f0b1a309237806bb3580763e0c480bbe1f8a10e9fd3b33c1ffcedfecbbdbc0861e2ebb877ee028ddd2f33d2a547859b9759433b17ecc688cb14331b2f40385117382a1f2c49b21093efde4e07a9854810d51bb0ed710a889caf9a72da4fdf50410265ff3dad80e3292cd362d2fb8e4805388ab10d99f1053e91beca28022cf5300faea2640d0614534ae8b35693b5e6fe33af121ccda2e63e5f94e05a53eecfee1a0da1f50f5ca7a295892ed8972004afc867b036493858cba403e1e843aac93cc86d7228acba9119c5fe7950fe3c36b740ab696b3a4b2ed4dc9998a1ddafef1f8bcf126d214b5fc488849525e0317bdbb9732b1142f8446f587015920c57e9e9578db6cfaa12e5925350f3f09d450350b1e3a74235bf89b99e238a77690063dc4b28abcfb58e2ee77ecb3bbada551caf2d23fa512e67bac6802381d26da4c078fd0ea799de2ffe13452ae8b757d0010ce61c648cd75bb5a76bb09f895fa143f14fcdcfed72773a13a0e44147b6fcba3d0c7ad8772f13a6179e0cea9e6e8fab3a16a3889cd669757e611d6879d820e0b288463631ec774dc8e4447112a353134ce12ff625947652b7f6c11d79b95ede63efa091c06984fbf287f376a5934e10a35c4555a5b9fda8872a6b5ca48a9d31e2a6bd3d6d1704367ec4478857f3ccac36b42dc16163cb03a058bb9bfa6989ec3f332c97d772d3affc4ab8d16b9378d6bb0db5e4d0802eb00b1a72f895e010d390786a73090ef27dc6e777d55826ba21403f00383098a4423a1780147d0bc6feb11cfbf8963af68f33ecba20b416f038c23b8a89616be68abdc7809d1841a3378c8954a09db4cdb331ddc604cbea9cff1c1726aea00e52f50fd7394d86d1650542904e66376050437637b2b82fac6a73ffeb3ac41f9aeab287bb26297d993cb4bdd7caf569267d45143cd98603ebd86f8a18263e2e0b0baedcb87f8fd797685d3e895d35a8afcda528ca56764d1c2c8c847838046d338ff6b80cd8896d91a92bb8a266d4cd0fa5d1381dd00"/4881], 0x132c}, {&(0x7f0000004440)={0x4a4, 0x26, 0x300, 0x70bd2c, 0x25dfdbfe, "", [@typed={0x8, 0x18, 0x0, 0x0, @fd=r7}, @nested={0x1a5, 0x63, 0x0, 0x1, [@typed={0x8, 0x68, 0x0, 0x0, @fd=r8}, @generic="83124d1ab4a0e3c5aeff04774081199d25cb6d33c4fa130179075f44bf9771bb86725bfdc51332603014899c75ea679fb0fc56d90d16a1d4e081e33a58afd59b8b2179a2cfb6b7e037e820b45c5bafd87efd621e2586c5a4e070caf7e9630475e37f79cc8717874962de6dc0629c6a023ea0a5e7a07a3eb9c3bd37f79882196b0eff70e39405b2426eb50330d6644774eb0eb0e0d657a94da67f3aa61b66602bd00c601a5f3904d2a1003533181d701d17f151c109ece0360cdf6b13591e81e088", @generic="5b86c9291a81539d73b36ebb6e2a250a198ad2d5dd994c67ff075ff4263b92c9dc117a2760732cee1e1dc5f6e02382eb18562b570ece6c43063830d568c56c4868b7d15bdc930a67a43528a89990a60712e5f6", @generic="9c7ca158f7c8d30b17bacca908d5e2b5182178faa4b05307434c23a7d8b4fb713b7b460635e521166ae5881c2466457acc5eb9d7082c5d10aebb5b987fbc82", @typed={0x14, 0x8b, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @generic="cd79c573f9e714eea496046a7df8f889ec73699a80d704d4d6d7da167b51a2e0224b0bcd042226366bec", @typed={0x8, 0x83, 0x0, 0x0, @pid=r9}]}, @generic="3a68180a6bb3ef0b267b80c7864e9217239418b45378737db574f234d4b94b647438741aa4ac79091140f40dec4ac563df228a7271f1f572e13e9a06a8deac9b16776a9761e834d92d62ddea6f3f0e1a2679038e3c3dbcdae2e71a2f1b95937c4cafacb826338f0da2a90eaa98b2669853d54df22813cad4abfaa52917942aa5aac7348d3b736b5efef916", @nested={0xa8, 0x3f, 0x0, 0x1, [@typed={0x8, 0x18, 0x0, 0x0, @pid=r10}, @generic="086a998c3eaa2a625c3f5d2dbb8761ab3b3bf19968638b28ec928e2b6816bbbc19faae1e11ed28928df8d42afb9d8a19806b092df54f63fa8a0a6e6159e80f2f86b0b107731c82f101c3ae3c0a46ebc747d59b46803eb4c334f17708ecf5b7980cac784314fb1eb7e418d49d4686cbcd4f590d651c26af27c8d1d1e7524facebfa8de8c473621769befda6e3ee784b7b11c17efc", @typed={0x8, 0x62, 0x0, 0x0, @pid}]}, @generic="789fca7906a4f645532fac792bef5132586fa2965c3ebb6a777783771b5ca66630005599e6fec811d434b4b23d396d316f9a59281b2ac9d23638f2f4a5a4cd0b3a617b59913055df1d9939f721590fc9f30e4468674daf461bfa3758fe82e9cbd3b1bd07c93013321ce4b13d485378f26c570302043203c4a4801e57d1f56770e0813733b7bdaa0226543a4c3966accf9c3718d020b5512b435f34ec17ae70b4db2646c9078fdc0f1821d8de89807f302675ff0d1abb73", @generic="303351e5532e7ee976408ba34a0a6ee175e42adeffe88bea1ccf38cc5206ef089918c149a9d5bc2827860176df8ba496ad2337c31fcc1a5a64713dd9445992ed521996caebdc454f6cc08fb8eb20047ac7b192521986c2e353b9852c20770dda7d3f904f836ae7ace7151412b2ad9f4c30cedb90951a81d5adcfa3f73ebd1ec07f7a151c5bf7a3e08c4f9afc6863d8de179f8fbb1c38a29c4aaf32be9333c98cd8481148d213582f4b01434934c9763690cbd54b319683f9e44c156bda21ddb59718d59c28c6e4946aced7b02ca9edbc1448fd7cbd9bfd1cf4a292b6b6c15005206804", @typed={0x14, 0x27, 0x0, 0x0, @ipv6=@remote}]}, 0x4a4}], 0xa, &(0x7f00000049c0), 0x0, 0x20004001}, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) [ 2149.987626] attempt to access beyond end of device [ 2149.987626] loop6: rw=2049, want=404, limit=158 13:36:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xae, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:36:57 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, r3, 0x0, 0x0}, 0x0) r4 = dup2(r0, r0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f00000007c0)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000180)=""/180, 0xb4}, {&(0x7f0000000240)=""/162, 0xa2}, {&(0x7f0000000300)=""/204, 0xcc}, {&(0x7f0000000400)=""/150, 0x96}, {&(0x7f00000004c0)=""/24, 0x18}, {&(0x7f0000000500)=""/92, 0x5c}, {&(0x7f0000000580)=""/193, 0xc1}], 0x7, &(0x7f0000000700)=""/71, 0x47}, 0x0, 0x20, 0x1, {0x0, r5}}, 0x6) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x100000001) r8 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) sendfile(r6, r8, 0x0, 0x80000001) ioctl$BTRFS_IOC_BALANCE_CTL(r8, 0x40049421, 0x1) readv(0xffffffffffffffff, 0x0, 0x0) 13:36:57 executing program 7: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x2, 0x0) 13:36:57 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 9) 13:36:57 executing program 0: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:36:57 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}, {&(0x7f0000000440)=""/135, 0x87}], 0x2, 0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) [ 2150.256233] FAULT_INJECTION: forcing a failure. [ 2150.256233] name failslab, interval 1, probability 0, space 0, times 0 [ 2150.257481] CPU: 0 PID: 12706 Comm: syz-executor.6 Not tainted 5.10.183 #1 [ 2150.258216] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2150.259096] Call Trace: [ 2150.259394] dump_stack+0x107/0x167 [ 2150.259785] should_fail.cold+0x5/0xa [ 2150.260201] ? create_object.isra.0+0x3a/0xa20 [ 2150.260695] should_failslab+0x5/0x20 [ 2150.261104] kmem_cache_alloc+0x5b/0x310 [ 2150.261544] create_object.isra.0+0x3a/0xa20 [ 2150.262014] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2150.262564] kmem_cache_alloc+0x159/0x310 [ 2150.263021] alloc_buffer_head+0x20/0x110 [ 2150.263473] alloc_page_buffers+0x14d/0x700 [ 2150.263953] create_empty_buffers+0x2c/0x640 [ 2150.264429] create_page_buffers+0x1bb/0x230 [ 2150.264898] __block_write_begin_int+0x1d1/0x19c0 [ 2150.265422] ? fat_add_cluster+0x100/0x100 [ 2150.265892] ? add_to_page_cache_locked+0x40/0x40 [ 2150.266427] ? __page_cache_alloc+0x10d/0x360 [ 2150.266921] ? remove_inode_buffers+0x300/0x300 [ 2150.267432] ? pagecache_get_page+0x243/0xc80 [ 2150.267929] ? perf_trace_lock+0xac/0x490 [ 2150.268394] ? wait_for_stable_page+0x92/0xe0 [ 2150.268886] cont_write_begin+0x472/0x980 [ 2150.269346] ? fat_add_cluster+0x100/0x100 [ 2150.269810] ? nobh_write_begin+0xed0/0xed0 [ 2150.270284] ? __mark_inode_dirty+0x93b/0xd40 [ 2150.270774] ? lock_downgrade+0x6d0/0x6d0 [ 2150.271231] ? do_raw_spin_lock+0x121/0x260 [ 2150.271706] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2150.272259] fat_write_begin+0x89/0x180 [ 2150.272695] ? fat_add_cluster+0x100/0x100 [ 2150.273170] generic_perform_write+0x20a/0x4f0 [ 2150.273677] ? fat_direct_IO+0x1ef/0x380 [ 2150.274128] ? page_cache_next_miss+0x310/0x310 [ 2150.274654] __generic_file_write_iter+0x2cd/0x5d0 [ 2150.275190] generic_file_write_iter+0xdb/0x230 [ 2150.275703] do_iter_readv_writev+0x476/0x750 [ 2150.276201] ? new_sync_write+0x660/0x660 [ 2150.276657] ? selinux_file_permission+0x92/0x520 [ 2150.277198] do_iter_write+0x191/0x670 [ 2150.277643] ? trace_hardirqs_on+0x5b/0x180 [ 2150.278113] vfs_iter_write+0x70/0xa0 [ 2150.278533] iter_file_splice_write+0x762/0xc30 [ 2150.279044] ? generic_splice_sendpage+0x140/0x140 [ 2150.279594] ? avc_policy_seqno+0x9/0x70 [ 2150.280058] ? selinux_file_permission+0x92/0x520 [ 2150.280592] ? lockdep_init_map_type+0x2c7/0x780 [ 2150.281119] ? generic_splice_sendpage+0x140/0x140 [ 2150.281667] direct_splice_actor+0x10f/0x170 [ 2150.282155] splice_direct_to_actor+0x387/0x980 [ 2150.282670] ? pipe_to_sendpage+0x380/0x380 [ 2150.283151] ? do_splice_to+0x160/0x160 [ 2150.283592] ? security_file_permission+0x24e/0x570 [ 2150.284170] do_splice_direct+0x1c4/0x290 [ 2150.284629] ? splice_direct_to_actor+0x980/0x980 [ 2150.285159] ? selinux_file_permission+0x92/0x520 [ 2150.285699] ? security_file_permission+0x24e/0x570 [ 2150.286256] do_sendfile+0x553/0x1090 [ 2150.286686] ? do_pwritev+0x270/0x270 [ 2150.287117] ? wait_for_completion_io+0x270/0x270 [ 2150.287656] ? rcu_read_lock_any_held+0x75/0xa0 [ 2150.288176] ? vfs_write+0x354/0xa70 [ 2150.288594] __x64_sys_sendfile64+0x1d1/0x210 [ 2150.289092] ? __ia32_sys_sendfile+0x220/0x220 [ 2150.289595] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2150.290176] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2150.290746] do_syscall_64+0x33/0x40 [ 2150.291161] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2150.291722] RIP: 0033:0x7f612efb4b19 [ 2150.292146] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2150.294157] RSP: 002b:00007f612c52a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2150.295001] RAX: ffffffffffffffda RBX: 00007f612f0c7f60 RCX: 00007f612efb4b19 [ 2150.295787] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2150.296593] RBP: 00007f612c52a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2150.297378] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 2150.298175] R13: 00007ffd9f25fb2f R14: 00007f612c52a300 R15: 0000000000022000 [ 2150.407520] attempt to access beyond end of device [ 2150.407520] loop6: rw=2049, want=404, limit=158 13:37:14 executing program 0: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:37:14 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x10000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="06000400000000002e2f66696c653000"]) 13:37:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:37:14 executing program 7: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x4, 0x0) 13:37:14 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:37:14 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 10) 13:37:14 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}, {&(0x7f0000000440)=""/135, 0x87}], 0x2, 0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:37:14 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2167.609773] FAULT_INJECTION: forcing a failure. [ 2167.609773] name failslab, interval 1, probability 0, space 0, times 0 [ 2167.612241] CPU: 1 PID: 12726 Comm: syz-executor.6 Not tainted 5.10.183 #1 [ 2167.613635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2167.615289] Call Trace: [ 2167.615823] dump_stack+0x107/0x167 [ 2167.616576] should_fail.cold+0x5/0xa [ 2167.617342] ? create_object.isra.0+0x3a/0xa20 [ 2167.618261] should_failslab+0x5/0x20 [ 2167.619027] kmem_cache_alloc+0x5b/0x310 [ 2167.619846] create_object.isra.0+0x3a/0xa20 [ 2167.620733] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2167.621747] kmem_cache_alloc+0x159/0x310 [ 2167.622590] alloc_buffer_head+0x20/0x110 [ 2167.623417] alloc_page_buffers+0x14d/0x700 [ 2167.624294] create_empty_buffers+0x2c/0x640 [ 2167.625194] create_page_buffers+0x1bb/0x230 [ 2167.626085] __block_write_begin_int+0x1d1/0x19c0 [ 2167.627082] ? fat_add_cluster+0x100/0x100 [ 2167.627934] ? add_to_page_cache_locked+0x40/0x40 [ 2167.628918] ? __page_cache_alloc+0x10d/0x360 [ 2167.629820] ? remove_inode_buffers+0x300/0x300 [ 2167.630747] ? pagecache_get_page+0x243/0xc80 [ 2167.631643] ? perf_trace_lock+0xac/0x490 [ 2167.632480] ? wait_for_stable_page+0x92/0xe0 [ 2167.633381] cont_write_begin+0x472/0x980 [ 2167.634219] ? fat_add_cluster+0x100/0x100 [ 2167.635063] ? nobh_write_begin+0xed0/0xed0 [ 2167.635926] ? __mark_inode_dirty+0x93b/0xd40 [ 2167.636849] ? lock_downgrade+0x6d0/0x6d0 [ 2167.637681] ? do_raw_spin_lock+0x121/0x260 [ 2167.638547] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2167.639567] fat_write_begin+0x89/0x180 [ 2167.640368] ? fat_add_cluster+0x100/0x100 [ 2167.641225] generic_perform_write+0x20a/0x4f0 [ 2167.642143] ? fat_direct_IO+0x1ef/0x380 [ 2167.642956] ? page_cache_next_miss+0x310/0x310 [ 2167.643902] __generic_file_write_iter+0x2cd/0x5d0 [ 2167.644905] generic_file_write_iter+0xdb/0x230 [ 2167.645838] do_iter_readv_writev+0x476/0x750 [ 2167.646738] ? new_sync_write+0x660/0x660 [ 2167.647564] ? selinux_file_permission+0x92/0x520 [ 2167.648553] do_iter_write+0x191/0x670 [ 2167.649337] ? trace_hardirqs_on+0x5b/0x180 [ 2167.650207] vfs_iter_write+0x70/0xa0 [ 2167.650985] iter_file_splice_write+0x762/0xc30 [ 2167.651952] ? generic_splice_sendpage+0x140/0x140 [ 2167.652950] ? avc_policy_seqno+0x9/0x70 [ 2167.653779] ? selinux_file_permission+0x92/0x520 [ 2167.654749] ? lockdep_init_map_type+0x2c7/0x780 [ 2167.655716] ? generic_splice_sendpage+0x140/0x140 [ 2167.656728] direct_splice_actor+0x10f/0x170 [ 2167.657632] splice_direct_to_actor+0x387/0x980 [ 2167.658586] ? pipe_to_sendpage+0x380/0x380 [ 2167.659453] ? do_splice_to+0x160/0x160 [ 2167.660272] ? security_file_permission+0x24e/0x570 [ 2167.661298] do_splice_direct+0x1c4/0x290 [ 2167.662136] ? splice_direct_to_actor+0x980/0x980 [ 2167.663113] ? selinux_file_permission+0x92/0x520 [ 2167.664096] ? security_file_permission+0x24e/0x570 [ 2167.665131] do_sendfile+0x553/0x1090 [ 2167.665910] ? do_pwritev+0x270/0x270 [ 2167.666680] ? wait_for_completion_io+0x270/0x270 [ 2167.667654] ? rcu_read_lock_any_held+0x75/0xa0 [ 2167.668595] ? vfs_write+0x354/0xa70 [ 2167.669366] __x64_sys_sendfile64+0x1d1/0x210 [ 2167.670285] ? __ia32_sys_sendfile+0x220/0x220 [ 2167.671222] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2167.672294] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2167.673335] do_syscall_64+0x33/0x40 [ 2167.674089] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2167.675121] RIP: 0033:0x7f612efb4b19 [ 2167.675876] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2167.679580] RSP: 002b:00007f612c52a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2167.681110] RAX: ffffffffffffffda RBX: 00007f612f0c7f60 RCX: 00007f612efb4b19 [ 2167.682524] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2167.683939] RBP: 00007f612c52a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2167.685361] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 2167.686784] R13: 00007ffd9f25fb2f R14: 00007f612c52a300 R15: 0000000000022000 13:37:15 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) sendfile(r1, r2, 0x0, 0x20d315) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"]) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(r0, 0x0, 0x0) 13:37:15 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:37:15 executing program 7: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x8, 0x0) 13:37:15 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}, {&(0x7f0000000440)=""/135, 0x87}], 0x2, 0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:37:15 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2167.892837] attempt to access beyond end of device [ 2167.892837] loop6: rw=2049, want=404, limit=158 13:37:15 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:37:15 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f0"], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:37:30 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f0"], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:37:30 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000100)=0x3f0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:37:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 13:37:30 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}, {&(0x7f0000000440)=""/135, 0x87}], 0x2, 0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x3f74, 0x0, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:37:30 executing program 7: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x18, 0x0) 13:37:30 executing program 0: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:37:30 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:37:30 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x9ec3}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) (fail_nth: 11) [ 2183.178762] Process accounting resumed 13:37:30 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x400, 0x7fffffff, 0x2, 0x100, 0xf2aeb1b}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 13:37:30 executing program 7: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000001a64000000000000647809140b2a3a08000000010000010a46494c452e434f4c3b310041410e0254455854756e6978000052520501894e4d0e010066696c652e636f6c64505824016d8100000000816d01000000000000010000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08007400180000000000001800080000000008007809140b2a3a08020000010000010546494c4530", 0x1a0, 0xb800}, {&(0x7f0000010d00)='f', 0x1, 0xc000}], 0x0, &(0x7f0000000180)={[{@check_relaxed}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x1800, 0x0) [ 2183.283795] FAULT_INJECTION: forcing a failure. [ 2183.283795] name failslab, interval 1, probability 0, space 0, times 0 [ 2183.286611] CPU: 0 PID: 12800 Comm: syz-executor.6 Not tainted 5.10.183 #1 [ 2183.288035] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2183.289720] Call Trace: [ 2183.290270] dump_stack+0x107/0x167 [ 2183.291010] should_fail.cold+0x5/0xa [ 2183.291799] ? __iomap_dio_rw+0x1ee/0x1110 [ 2183.292670] should_failslab+0x5/0x20 [ 2183.293452] kmem_cache_alloc_trace+0x55/0x320 [ 2183.294397] __iomap_dio_rw+0x1ee/0x1110 [ 2183.295251] ? jbd2_journal_stop+0x188/0xdc0 [ 2183.296155] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2183.297110] ? ext4_orphan_add+0x253/0x9e0 [ 2183.297980] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2183.298988] ? ext4_empty_dir+0xae0/0xae0 [ 2183.299838] ? jbd2__journal_start+0xf3/0x7e0 [ 2183.300778] iomap_dio_rw+0x31/0x90 [ 2183.301530] ext4_file_write_iter+0xb26/0x18d0 [ 2183.302483] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2183.303416] ? kasan_save_stack+0x32/0x40 [ 2183.304263] ? kasan_save_stack+0x1b/0x40 [ 2183.305116] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2183.306148] ? iter_file_splice_write+0x16d/0xc30 [ 2183.307130] ? direct_splice_actor+0x10f/0x170 [ 2183.308061] ? splice_direct_to_actor+0x387/0x980 [ 2183.309059] ? do_splice_direct+0x1c4/0x290 [ 2183.309942] ? do_sendfile+0x553/0x1090 [ 2183.310758] ? __x64_sys_sendfile64+0x1d1/0x210 [ 2183.311722] do_iter_readv_writev+0x476/0x750 [ 2183.312655] ? new_sync_write+0x660/0x660 [ 2183.313502] ? selinux_file_permission+0x92/0x520 [ 2183.314516] do_iter_write+0x191/0x670 [ 2183.315322] ? trace_hardirqs_on+0x5b/0x180 [ 2183.316214] vfs_iter_write+0x70/0xa0 [ 2183.317015] iter_file_splice_write+0x762/0xc30 [ 2183.317986] ? generic_splice_sendpage+0x140/0x140 [ 2183.319003] ? avc_policy_seqno+0x9/0x70 [ 2183.319833] ? selinux_file_permission+0x92/0x520 [ 2183.320839] ? lockdep_init_map_type+0x2c7/0x780 [ 2183.321813] ? generic_splice_sendpage+0x140/0x140 [ 2183.322820] direct_splice_actor+0x10f/0x170 [ 2183.323723] splice_direct_to_actor+0x387/0x980 [ 2183.324701] ? pipe_to_sendpage+0x380/0x380 [ 2183.325586] ? do_splice_to+0x160/0x160 [ 2183.326400] ? security_file_permission+0x24e/0x570 [ 2183.327438] do_splice_direct+0x1c4/0x290 [ 2183.328292] ? splice_direct_to_actor+0x980/0x980 [ 2183.329281] ? selinux_file_permission+0x92/0x520 [ 2183.330275] ? security_file_permission+0x24e/0x570 [ 2183.331310] do_sendfile+0x553/0x1090 [ 2183.332106] ? do_pwritev+0x270/0x270 [ 2183.332906] ? wait_for_completion_io+0x270/0x270 [ 2183.333898] ? rcu_read_lock_any_held+0x75/0xa0 [ 2183.334846] ? vfs_write+0x354/0xa70 [ 2183.335618] __x64_sys_sendfile64+0x1d1/0x210 [ 2183.336545] ? __ia32_sys_sendfile+0x220/0x220 [ 2183.337486] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2183.338560] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2183.339621] do_syscall_64+0x33/0x40 [ 2183.340387] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2183.341459] RIP: 0033:0x7f612efb4b19 [ 2183.342229] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2183.345992] RSP: 002b:00007f612c509188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2183.347552] RAX: ffffffffffffffda RBX: 00007f612f0c8020 RCX: 00007f612efb4b19 [ 2183.349020] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 2183.350482] RBP: 00007f612c5091d0 R08: 0000000000000000 R09: 0000000000000000 [ 2183.351939] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 2183.353413] R13: 00007ffd9f25fb2f R14: 00007f612c509300 R15: 0000000000022000 13:37:30 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:37:30 executing program 2: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc52472aae6e9be2a52b04fa488"], 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}, {&(0x7f0000000440)=""/135, 0x87}], 0x2, 0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x3f74, 0x0, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:37:30 executing program 3: getxattr(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f0"], &(0x7f0000000340)=""/106, 0x6a) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000700)=""/114, 0x72}], 0x3, 0x5, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 13:37:30 executing program 4: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0xc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000239}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2186.246169] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2186.247471] CPU: 1 PID: 255 Comm: syz-fuzzer Not tainted 5.10.183 #1 [ 2186.248152] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2186.249067] Call Trace: [ 2186.249355] dump_stack+0x107/0x167 [ 2186.249743] dump_header+0x106/0x65e [ 2186.250139] oom_kill_process.cold+0x10/0x15 [ 2186.250614] out_of_memory+0x1149/0x1440 [ 2186.251052] ? oom_killer_disable+0x280/0x280 [ 2186.251538] ? mutex_trylock+0x237/0x2b0 [ 2186.251968] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2130 [ 2186.252634] __alloc_pages_slowpath.constprop.0+0x1b25/0x2130 [ 2186.253257] ? lock_acquire+0xd7/0x470 [ 2186.253674] ? warn_alloc+0x190/0x190 [ 2186.254165] __alloc_pages_nodemask+0x51d/0x600 [ 2186.254715] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2186.255432] ? find_get_entry+0x2c8/0x740 [ 2186.255920] alloc_pages_current+0x187/0x280 [ 2186.256474] __page_cache_alloc+0x2d2/0x360 [ 2186.256984] pagecache_get_page+0x2c7/0xc80 [ 2186.257461] filemap_fault+0x177d/0x2210 [ 2186.257911] ? read_cache_page_gfp+0x30/0x30 [ 2186.258391] ? replace_page_cache_page+0x1200/0x1200 [ 2186.258945] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2186.259524] ext4_filemap_fault+0x87/0xc0 [ 2186.259973] __do_fault+0x113/0x410 [ 2186.260373] handle_mm_fault+0x1e72/0x3520 [ 2186.260863] ? _copy_from_user+0xfb/0x1b0 [ 2186.261319] ? __pmd_alloc+0x5e0/0x5e0 [ 2186.261760] ? vmacache_find+0x55/0x2a0 [ 2186.262200] ? vmacache_update+0xce/0x140 [ 2186.262657] do_user_addr_fault+0x56e/0xc60 [ 2186.263279] exc_page_fault+0xa2/0x1a0 [ 2186.263707] ? asm_exc_page_fault+0x8/0x30 [ 2186.264230] asm_exc_page_fault+0x1e/0x30 [ 2186.264721] RIP: 0033:0x466533 [ 2186.265079] Code: 24 20 c3 cc cc cc cc 48 8b 7c 24 08 8b 74 24 10 8b 54 24 14 4c 8b 54 24 18 4c 8b 44 24 20 44 8b 4c 24 28 b8 ca 00 00 00 0f 05 <89> 44 24 30 c3 cc cc cc cc cc cc cc cc 8b 7c 24 08 48 8b 74 24 10 [ 2186.267075] RSP: 002b:000000c00003fe80 EFLAGS: 00010206 [ 2186.267647] RAX: ffffffffffffff92 RBX: 000000003b97f55a RCX: 0000000000466533 [ 2186.268421] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 0000000001f20e78 [ 2186.269213] RBP: 000000c00003fec8 R08: 0000000000000000 R09: 0000000000000000 [ 2186.269987] R10: 000000c00003feb8 R11: 0000000000000206 R12: 0000000000438880 [ 2186.270730] R13: 0000000000000000 R14: 0000000000e5de2c R15: 0000000000000000 [ 2186.271595] Mem-Info: [ 2186.271898] active_anon:8237 inactive_anon:61695 isolated_anon:0 [ 2186.271898] active_file:167 inactive_file:264 isolated_file:0 [ 2186.271898] unevictable:0 dirty:0 writeback:0 [ 2186.271898] slab_reclaimable:9422 slab_unreclaimable:64702 [ 2186.271898] mapped:69787 shmem:393 pagetables:2770 bounce:0 [ 2186.271898] free:3304 free_pcp:91 free_cma:0 [ 2186.275346] Node 0 active_anon:32948kB inactive_anon:246780kB active_file:668kB inactive_file:1056kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:279148kB dirty:0kB writeback:0kB shmem:1572kB writeback_tmp:0kB kernel_stack:5632kB all_unreclaimable? no [ 2186.277917] Node 0 DMA free:6508kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2186.280750] lowmem_reserve[]: 0 1616 1616 1616 [ 2186.281300] Node 0 DMA32 free:6708kB min:5116kB low:6768kB high:8420kB reserved_highatomic:2048KB active_anon:32948kB inactive_anon:246780kB active_file:612kB inactive_file:1280kB unevictable:0kB writepending:0kB present:2080640kB managed:1660504kB mlocked:0kB pagetables:11080kB bounce:0kB free_pcp:464kB local_pcp:0kB free_cma:0kB [ 2186.284461] lowmem_reserve[]: 0 0 0 0 [ 2186.284904] Node 0 DMA: 1*4kB (U) 1*8kB (U) 0*16kB 1*32kB (U) 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6508kB [ 2186.286472] Node 0 DMA32: 269*4kB (UMEH) 163*8kB (UMH) 61*16kB (UM) 45*32kB (UMH) 22*64kB (UMH) 2*128kB (U) 0*256kB 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 6972kB [ 2186.288182] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2186.289145] 785 total pagecache pages [ 2186.289563] 0 pages in swap cache [ 2186.289948] Swap cache stats: add 0, delete 0, find 0/0 [ 2186.290545] Free swap = 0kB [ 2186.290875] Total swap = 0kB [ 2186.291227] 524158 pages RAM [ 2186.291559] 0 pages HighMem/MovableOnly [ 2186.291996] 105055 pages reserved [ 2186.292398] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/ssh.service,task=syz-fuzzer,pid=255,uid=0 [ 2186.294841] Out of memory (oom_kill_allocating_task): Killed process 254 (syz-fuzzer) total-vm:1241536kB, anon-rss:232680kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:928kB oom_score_adj:0 [ 2187.440369] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 2189.936765] sshd invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2189.938816] CPU: 1 PID: 12829 Comm: sshd Not tainted 5.10.183 #1 [ 2189.940035] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2189.941706] Call Trace: [ 2189.942244] dump_stack+0x107/0x167 [ 2189.942980] dump_header+0x106/0x65e [ 2189.943733] oom_kill_process.cold+0x10/0x15 [ 2189.944640] out_of_memory+0x1149/0x1440 [ 2189.945463] ? oom_killer_disable+0x280/0x280 [ 2189.946370] ? mutex_trylock+0x237/0x2b0 [ 2189.947197] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2130 [ 2189.948392] __alloc_pages_slowpath.constprop.0+0x1b25/0x2130 [ 2189.949578] ? lock_acquire+0xd7/0x470 [ 2189.950365] ? warn_alloc+0x190/0x190 [ 2189.951150] __alloc_pages_nodemask+0x51d/0x600 [ 2189.952082] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2189.953313] ? find_get_entry+0x2c8/0x740 [ 2189.954264] alloc_pages_current+0x187/0x280 [ 2189.955175] __page_cache_alloc+0x2d2/0x360 [ 2189.956042] pagecache_get_page+0x2c7/0xc80 [ 2189.956927] filemap_fault+0x177d/0x2210 [ 2189.957752] ? read_cache_page_gfp+0x30/0x30 [ 2189.958639] ? replace_page_cache_page+0x1200/0x1200 [ 2189.959655] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2189.960715] ext4_filemap_fault+0x87/0xc0 [ 2189.961566] __do_fault+0x113/0x410 [ 2189.962400] handle_mm_fault+0x1e72/0x3520 [ 2189.963255] ? trace_hardirqs_on+0x5b/0x180 [ 2189.964112] ? find_held_lock+0x2c/0x110 [ 2189.964941] ? __pmd_alloc+0x5e0/0x5e0 [ 2189.965728] ? vmacache_find+0x55/0x2a0 [ 2189.966530] do_user_addr_fault+0x56e/0xc60 [ 2189.967403] exc_page_fault+0xa2/0x1a0 [ 2189.968179] ? asm_exc_page_fault+0x8/0x30 [ 2189.969031] asm_exc_page_fault+0x1e/0x30 [ 2189.969862] RIP: 0033:0x7f1e10bfca48 [ 2189.970606] Code: Unable to access opcode bytes at RIP 0x7f1e10bfca1e. [ 2189.971911] RSP: 002b:00007fffb9f59a38 EFLAGS: 00010216 [ 2189.973069] RAX: 0000000000000004 RBX: 0000000000000000 RCX: 000000000000000d [ 2189.974577] RDX: 000000000000ffff RSI: 00007f1e107097e0 RDI: 00007f1e107bf5f0 [ 2189.976160] RBP: 0000000000000000 R08: 000000000000ffff R09: ffffffffffffab18 [ 2189.977588] R10: 00007f1e10bfca40 R11: 0000000000000246 R12: 00007f1e107dbf20 [ 2189.979004] R13: 00007f1e107097ed R14: 00007f1e10c0b060 R15: 00007f1e107db000 [ 2189.980674] Mem-Info: [ 2189.981226] active_anon:37 inactive_anon:8124 isolated_anon:0 [ 2189.981226] active_file:3 inactive_file:47 isolated_file:0 [ 2189.981226] unevictable:0 dirty:0 writeback:0 [ 2189.981226] slab_reclaimable:6965 slab_unreclaimable:61549 [ 2189.981226] mapped:8727 shmem:95 pagetables:379 bounce:0 [ 2189.981226] free:3632 free_pcp:90 free_cma:0 [ 2189.987419] Node 0 active_anon:148kB inactive_anon:32496kB active_file:12kB inactive_file:188kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:34908kB dirty:0kB writeback:0kB shmem:380kB writeback_tmp:0kB kernel_stack:3040kB all_unreclaimable? no [ 2189.991980] Node 0 DMA free:6508kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2189.997664] lowmem_reserve[]: 0 1616 1616 1616 [ 2189.998637] Node 0 DMA32 free:8020kB min:5116kB low:6768kB high:8420kB reserved_highatomic:2048KB active_anon:148kB inactive_anon:32496kB active_file:496kB inactive_file:184kB unevictable:0kB writepending:0kB present:2080640kB managed:1660504kB mlocked:0kB pagetables:1516kB bounce:0kB free_pcp:440kB local_pcp:108kB free_cma:0kB [ 2190.004342] lowmem_reserve[]: 0 0 0 0 [ 2190.005180] Node 0 DMA: 1*4kB (U) 1*8kB (U) 0*16kB 1*32kB (U) 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6508kB [ 2190.008395] Node 0 DMA32: 663*4kB (UMEH) 280*8kB (UMEH) 82*16kB (UMEH) 36*32kB (UMEH) 3*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 7548kB [ 2190.011374] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2190.013092] 185 total pagecache pages [ 2190.013842] 0 pages in swap cache [ 2190.014554] Swap cache stats: add 0, delete 0, find 0/0 [ 2190.015631] Free swap = 0kB [ 2190.016253] Total swap = 0kB [ 2190.016876] 524158 pages RAM [ 2190.017506] 0 pages HighMem/MovableOnly [ 2190.018325] 105055 pages reserved [ 2190.019385] Unreclaimable slab info: [ 2190.021026] Name Used Total [ 2190.022237] pid_3 7KB 7KB [ 2190.023331] pid_2 83KB 93KB [ 2190.024427] IEEE-802.15.4-MAC 63KB 63KB [ 2190.025535] IEEE-802.15.4-RAW 63KB 63KB [ 2190.026856] p9_req_t 8KB 8KB [ 2190.027946] ip6-frags 7KB 7KB [ 2190.029039] fib6_nodes 32KB 32KB [ 2190.030144] ip6_dst_cache 48KB 48KB [ 2190.031229] PINGv6 63KB 63KB [ 2190.032319] RAWv6 315KB 315KB [ 2190.033422] UDPLITEv6 62KB 62KB [ 2190.034510] UDPv6 62KB 62KB [ 2190.035600] tw_sock_TCPv6 7KB 7KB [ 2190.036689] request_sock_TCPv6 15KB 15KB [ 2190.037812] TCPv6 62KB 62KB [ 2190.038909] scsi_sense_cache 4KB 4KB [ 2190.040112] sd_ext_cdb 3KB 3KB [ 2190.041396] virtio_scsi_cmd 16KB 16KB [ 2190.042578] sgpool-128 89KB 178KB [ 2190.043659] sgpool-64 63KB 63KB [ 2190.044753] sgpool-32 803KB 803KB [ 2190.045834] sgpool-16 277KB 277KB [ 2190.046915] sgpool-8 168KB 168KB [ 2190.048001] io_kiocb 30KB 48KB [ 2190.049095] mqueue_inode_cache 62KB 62KB [ 2190.050220] nfs_commit_data 15KB 15KB [ 2190.051306] nfs_write_data 47KB 47KB [ 2190.052399] jbd2_inode 11KB 11KB [ 2190.053775] ext4_system_zone 7KB 7KB [ 2190.055035] ext4_io_end_vec 7KB 7KB [ 2190.056325] ext4_bio_post_read_ctx 15KB 15KB [ 2190.057608] kioctx 31KB 31KB [ 2190.058866] aio_kiocb 7KB 7KB [ 2190.059951] dio 92KB 92KB [ 2190.061053] bio-2 4KB 4KB [ 2190.062235] fasync_cache 7KB 7KB [ 2190.063320] pid_namespace 7KB 7KB [ 2190.064395] posix_timers_cache 15KB 15KB [ 2190.065518] rpc_buffers 31KB 31KB [ 2190.066597] rpc_tasks 3KB 3KB [ 2190.067679] UNIX 210KB 384KB [ 2190.068783] UDP-Lite 63KB 63KB [ 2190.069867] tcp_bind_bucket 8KB 8KB [ 2190.070949] inet_peer_cache 8KB 8KB [ 2190.072033] xfrm_state 32KB 32KB [ 2190.073122] ip_fib_trie 8KB 8KB [ 2190.074251] ip_fib_alias 15KB 15KB [ 2190.075337] ip_dst_cache 36KB 44KB [ 2190.076419] PING 62KB 62KB [ 2190.077533] RAW 93KB 93KB [ 2190.078637] UDP 378KB 378KB [ 2190.079729] tw_sock_TCP 15KB 15KB [ 2190.080835] request_sock_TCP 15KB 15KB [ 2190.081933] TCP 60KB 60KB [ 2190.083037] hugetlbfs_inode_cache 30KB 30KB [ 2190.084208] bio-1 11KB 11KB [ 2190.085315] eventpoll_pwq 23KB 23KB [ 2190.086419] eventpoll_epi 51KB 51KB [ 2190.087498] inotify_inode_mark 66KB 66KB [ 2190.088614] request_queue 90KB 90KB [ 2190.089700] blkdev_ioc 33KB 33KB [ 2190.090779] bio-0 584KB 584KB [ 2190.091856] biovec-max 756KB 867KB [ 2190.092948] biovec-64 1008KB 1008KB [ 2190.094032] biovec-16 176KB 176KB [ 2190.095111] user_namespace 31KB 31KB [ 2190.096195] uid_cache 8KB 8KB [ 2190.097291] dmaengine-unmap-2 4KB 4KB [ 2190.098371] audit_buffer 7KB 7KB [ 2190.099455] skbuff_fclone_cache 67KB 97KB [ 2190.100618] skbuff_head_cache 412KB 723KB [ 2190.101708] configfs_dir_cache 8KB 8KB [ 2190.102805] file_lock_cache 78KB 78KB [ 2190.103890] file_lock_ctx 7KB 7KB [ 2190.104993] fsnotify_mark_connector 32KB 32KB [ 2190.106195] net_namespace 132KB 172KB [ 2190.107285] task_delay_info 102KB 127KB [ 2190.108363] taskstats 100KB 100KB [ 2190.109473] proc_dir_entry 419KB 453KB [ 2190.110556] pde_opener 43KB 43KB [ 2190.111647] seq_file 60KB 63KB [ 2190.112745] sigqueue 110KB 110KB [ 2190.113833] shmem_inode_cache 1256KB 1477KB [ 2190.114918] kernfs_iattrs_cache 258KB 258KB [ 2190.116045] kernfs_node_cache 6093KB 6143KB [ 2190.117150] mnt_cache 236KB 236KB [ 2190.118254] filp 751KB 1470KB [ 2190.119345] names_cache 2834KB 3629KB [ 2190.120430] hashtab_node 274KB 274KB [ 2190.121527] ebitmap_node 1153KB 1153KB [ 2190.122610] avtab_node 4976KB 4976KB [ 2190.123693] avc_node 35KB 35KB [ 2190.124831] lsm_inode_cache 2638KB 3071KB [ 2190.125920] lsm_file_cache 191KB 220KB [ 2190.127001] key_jar 39KB 39KB [ 2190.128093] uts_namespace 15KB 15KB [ 2190.129185] nsproxy 7KB 7KB [ 2190.130289] vm_area_struct 1345KB 1580KB [ 2190.131373] mm_struct 350KB 472KB [ 2190.132454] fs_cache 60KB 60KB [ 2190.133568] files_cache 236KB 270KB [ 2190.134660] signal_cache 472KB 524KB [ 2190.135752] sighand_cache 386KB 450KB [ 2190.136858] task_struct 1286KB 1968KB [ 2190.137945] cred_jar 124KB 204KB [ 2190.139045] anon_vma_chain 316KB 421KB [ 2190.140150] anon_vma 211KB 318KB [ 2190.141250] pid 54KB 67KB [ 2190.142342] Acpi-Operand 160KB 194KB [ 2190.143422] Acpi-ParseExt 27KB 27KB [ 2190.144514] Acpi-Parse 177KB 193KB [ 2190.145602] Acpi-State 153KB 169KB [ 2190.146686] Acpi-Namespace 24KB 24KB [ 2190.147770] shared_policy_node 8KB 8KB [ 2190.148874] numa_policy 7KB 7KB [ 2190.149961] trace_event_file 163KB 163KB [ 2190.151043] ftrace_event_field 280KB 280KB [ 2190.152144] pool_workqueue 48KB 48KB [ 2190.153247] task_group 16KB 16KB [ 2190.154327] vmap_area 397KB 397KB [ 2190.155418] page->ptl 254KB 378KB [ 2190.156512] kmemleak_scan_area 203KB 203KB [ 2190.158849] kmemleak_object 133535KB 157828KB [ 2190.159946] kmalloc-8k 4784KB 4960KB [ 2190.161052] kmalloc-4k 8440KB 8560KB [ 2190.162143] kmalloc-2k 5348KB 5696KB [ 2190.163236] kmalloc-1k 2828KB 3680KB [ 2190.164356] kmalloc-512 2763KB 5216KB [ 2190.165451] kmalloc-256 1335KB 1480KB [ 2190.166532] kmalloc-192 768KB 768KB [ 2190.167630] kmalloc-128 548KB 724KB [ 2190.168735] kmalloc-96 385KB 644KB [ 2190.169850] kmalloc-64 858KB 1348KB [ 2190.170940] kmalloc-32 747KB 876KB [ 2190.172027] kmalloc-16 353KB 384KB [ 2190.173131] kmalloc-8 305KB 338KB [ 2190.174212] kmem_cache_node 47KB 47KB [ 2190.175290] kmem_cache 75KB 75KB [ 2190.176372] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/ssh.service,task=sshd,pid=12829,uid=0 [ 2190.179364] Out of memory (oom_kill_allocating_task): Killed process 12829 (sshd) total-vm:12464kB, anon-rss:260kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:64kB oom_score_adj:0 [ 2190.191680] in:imklog invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2190.193740] CPU: 1 PID: 178 Comm: in:imklog Not tainted 5.10.183 #1 [ 2190.195015] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2190.196698] Call Trace: [ 2190.197236] dump_stack+0x107/0x167 [ 2190.197972] dump_header+0x106/0x65e [ 2190.198720] oom_kill_process.cold+0x10/0x15 [ 2190.199613] out_of_memory+0x1149/0x1440 [ 2190.200437] ? oom_killer_disable+0x280/0x280 [ 2190.201343] ? mutex_trylock+0x237/0x2b0 [ 2190.202158] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2130 [ 2190.203350] __alloc_pages_slowpath.constprop.0+0x1b25/0x2130 [ 2190.204544] ? lock_acquire+0xd7/0x470 [ 2190.205329] ? warn_alloc+0x190/0x190 [ 2190.206116] __alloc_pages_nodemask+0x51d/0x600 [ 2190.207058] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2190.208264] ? find_get_entry+0x2c8/0x740 [ 2190.209110] alloc_pages_current+0x187/0x280 [ 2190.209996] __page_cache_alloc+0x2d2/0x360 [ 2190.210862] pagecache_get_page+0x2c7/0xc80 [ 2190.211733] filemap_fault+0x177d/0x2210 [ 2190.212572] ? read_cache_page_gfp+0x30/0x30 [ 2190.213454] ? replace_page_cache_page+0x1200/0x1200 [ 2190.214468] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2190.215522] ext4_filemap_fault+0x87/0xc0 [ 2190.216353] __do_fault+0x113/0x410 [ 2190.217092] handle_mm_fault+0x1e72/0x3520 [ 2190.217944] ? fsnotify+0xf50/0xf50 [ 2190.218673] ? find_held_lock+0x2c/0x110 [ 2190.219486] ? __pmd_alloc+0x5e0/0x5e0 [ 2190.220273] ? vmacache_find+0x55/0x2a0 [ 2190.221084] do_user_addr_fault+0x56e/0xc60 [ 2190.221955] exc_page_fault+0xa2/0x1a0 [ 2190.222740] ? asm_exc_page_fault+0x8/0x30 [ 2190.223585] asm_exc_page_fault+0x1e/0x30 [ 2190.224406] RIP: 0033:0x7f02b098a020 [ 2190.225166] Code: Unable to access opcode bytes at RIP 0x7f02b0989ff6. [ 2190.226471] RSP: 002b:00007f02b011d318 EFLAGS: 00010246 [ 2190.227536] RAX: 00000000648c65a1 RBX: 00007f02a0007f00 RCX: 0000000000000018 [ 2190.228974] RDX: 0000000000000000 RSI: 00007f02b011d330 RDI: 00007f02b011d328 [ 2190.230396] RBP: 0000000000000000 R08: 00000000648c65a1 R09: 00000000003eb278 [ 2190.231820] R10: 00007fff557e9080 R11: 0000000000000000 R12: 00007f02b011d390 [ 2190.233247] R13: 00007f02b011d390 R14: 0000000000000004 R15: 00007f02b011dd6d [ 2190.235239] Mem-Info: [ 2190.235757] active_anon:37 inactive_anon:8053 isolated_anon:0 [ 2190.235757] active_file:13 inactive_file:25 isolated_file:0 [ 2190.235757] unevictable:0 dirty:0 writeback:0 [ 2190.235757] slab_reclaimable:6942 slab_unreclaimable:61545 [ 2190.235757] mapped:8715 shmem:94 pagetables:379 bounce:0 [ 2190.235757] free:3481 free_pcp:79 free_cma:0 [ 2190.241880] Node 0 active_anon:148kB inactive_anon:32212kB active_file:52kB inactive_file:100kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:34860kB dirty:0kB writeback:0kB shmem:376kB writeback_tmp:0kB kernel_stack:3008kB all_unreclaimable? no [ 2190.246410] Node 0 DMA free:6508kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2190.251600] lowmem_reserve[]: 0 1616 1616 1616 [ 2190.252580] Node 0 DMA32 free:7416kB min:7164kB low:8816kB high:10468kB reserved_highatomic:2048KB active_anon:148kB inactive_anon:32464kB active_file:96kB inactive_file:220kB unevictable:0kB writepending:0kB present:2080640kB managed:1660504kB mlocked:0kB pagetables:1516kB bounce:0kB free_pcp:316kB local_pcp:68kB free_cma:0kB [ 2190.258307] lowmem_reserve[]: 0 0 0 0 [ 2190.259288] Node 0 DMA: 1*4kB (U) 1*8kB (U) 0*16kB 1*32kB (U) 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6508kB [ 2190.262089] Node 0 DMA32: 816*4kB (MEH) 261*8kB (MEH) 56*16kB (UMEH) 24*32kB (UMH) 3*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 7208kB [ 2190.265013] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2190.266707] 132 total pagecache pages [ 2190.267483] 0 pages in swap cache [ 2190.268210] Swap cache stats: add 0, delete 0, find 0/0 [ 2190.269311] Free swap = 0kB [ 2190.269915] Total swap = 0kB [ 2190.270540] 524158 pages RAM [ 2190.271165] 0 pages HighMem/MovableOnly [ 2190.271955] 105055 pages reserved [ 2190.272674] Unreclaimable slab info: [ 2190.273436] Name Used Total [ 2190.274558] pid_3 7KB 7KB [ 2190.275644] pid_2 83KB 93KB [ 2190.276753] IEEE-802.15.4-MAC 63KB 63KB [ 2190.277854] IEEE-802.15.4-RAW 63KB 63KB [ 2190.278935] p9_req_t 8KB 8KB [ 2190.280020] ip6-frags 7KB 7KB [ 2190.281112] fib6_nodes 32KB 32KB [ 2190.282196] ip6_dst_cache 48KB 48KB [ 2190.283277] PINGv6 63KB 63KB [ 2190.284363] RAWv6 315KB 315KB [ 2190.285455] UDPLITEv6 62KB 62KB [ 2190.286544] UDPv6 62KB 62KB [ 2190.287627] tw_sock_TCPv6 7KB 7KB [ 2190.288727] request_sock_TCPv6 15KB 15KB [ 2190.289827] TCPv6 62KB 62KB [ 2190.290912] scsi_sense_cache 4KB 4KB [ 2190.291996] sd_ext_cdb 3KB 3KB [ 2190.293094] virtio_scsi_cmd 16KB 16KB [ 2190.294184] sgpool-128 89KB 178KB [ 2190.295261] sgpool-64 63KB 63KB [ 2190.296341] sgpool-32 803KB 803KB [ 2190.297437] sgpool-16 277KB 277KB [ 2190.298524] sgpool-8 168KB 168KB [ 2190.299607] io_kiocb 30KB 48KB [ 2190.300697] mqueue_inode_cache 62KB 62KB [ 2190.301798] nfs_commit_data 15KB 15KB [ 2190.302876] nfs_write_data 47KB 47KB [ 2190.303963] jbd2_inode 11KB 11KB [ 2190.305070] ext4_system_zone 7KB 7KB [ 2190.306173] ext4_io_end_vec 7KB 7KB [ 2190.307257] ext4_bio_post_read_ctx 15KB 15KB [ 2190.308423] kioctx 31KB 31KB [ 2190.309516] aio_kiocb 7KB 7KB [ 2190.310599] dio 92KB 92KB [ 2190.311679] bio-2 4KB 4KB [ 2190.312775] fasync_cache 7KB 7KB [ 2190.313861] pid_namespace 7KB 7KB [ 2190.314942] posix_timers_cache 15KB 15KB [ 2190.316039] rpc_buffers 31KB 31KB [ 2190.317138] rpc_tasks 3KB 3KB [ 2190.318221] UNIX 210KB 384KB [ 2190.319311] UDP-Lite 63KB 63KB [ 2190.320394] tcp_bind_bucket 8KB 8KB [ 2190.321480] inet_peer_cache 8KB 8KB [ 2190.322561] xfrm_state 32KB 32KB [ 2190.323640] ip_fib_trie 8KB 8KB [ 2190.324744] ip_fib_alias 15KB 15KB [ 2190.325826] ip_dst_cache 36KB 44KB [ 2190.326910] PING 62KB 62KB [ 2190.327993] RAW 93KB 93KB [ 2190.329092] UDP 378KB 378KB [ 2190.330176] tw_sock_TCP 15KB 15KB [ 2190.331257] request_sock_TCP 15KB 15KB [ 2190.332339] TCP 60KB 60KB [ 2190.333439] hugetlbfs_inode_cache 30KB 30KB [ 2190.334594] bio-1 11KB 11KB [ 2190.335680] eventpoll_pwq 23KB 23KB [ 2190.336776] eventpoll_epi 51KB 51KB [ 2190.337862] inotify_inode_mark 66KB 66KB [ 2190.338964] request_queue 90KB 90KB [ 2190.340047] blkdev_ioc 33KB 33KB [ 2190.341143] bio-0 584KB 584KB [ 2190.342223] biovec-max 756KB 867KB [ 2190.343325] biovec-64 1008KB 1008KB [ 2190.344415] biovec-16 176KB 176KB [ 2190.345537] user_namespace 31KB 31KB [ 2190.346626] uid_cache 8KB 8KB [ 2190.347716] dmaengine-unmap-2 4KB 4KB [ 2190.348810] audit_buffer 7KB 7KB [ 2190.349897] skbuff_fclone_cache 67KB 97KB [ 2190.351030] skbuff_head_cache 412KB 723KB [ 2190.352130] configfs_dir_cache 8KB 8KB [ 2190.353257] file_lock_cache 78KB 78KB [ 2190.354340] file_lock_ctx 7KB 7KB [ 2190.355436] fsnotify_mark_connector 32KB 32KB [ 2190.356649] net_namespace 132KB 172KB [ 2190.357745] task_delay_info 102KB 127KB [ 2190.358824] taskstats 100KB 100KB [ 2190.359917] proc_dir_entry 419KB 453KB [ 2190.361023] pde_opener 43KB 43KB [ 2190.362123] seq_file 60KB 63KB [ 2190.363214] sigqueue 110KB 110KB [ 2190.364309] shmem_inode_cache 1256KB 1477KB [ 2190.365406] kernfs_iattrs_cache 258KB 258KB [ 2190.366530] kernfs_node_cache 6093KB 6143KB [ 2190.367614] mnt_cache 236KB 236KB [ 2190.368736] filp 751KB 1470KB [ 2190.369832] names_cache 2834KB 3629KB [ 2190.370911] hashtab_node 274KB 274KB [ 2190.371997] ebitmap_node 1153KB 1153KB [ 2190.373098] avtab_node 4976KB 4976KB [ 2190.374180] avc_node 35KB 35KB [ 2190.375293] lsm_inode_cache 2638KB 3071KB [ 2190.376380] lsm_file_cache 191KB 220KB [ 2190.377466] key_jar 39KB 39KB [ 2190.378545] uts_namespace 15KB 15KB [ 2190.379627] nsproxy 7KB 7KB [ 2190.380745] vm_area_struct 1345KB 1580KB [ 2190.381825] mm_struct 350KB 472KB [ 2190.382908] fs_cache 60KB 60KB [ 2190.383988] files_cache 236KB 270KB [ 2190.385093] signal_cache 472KB 524KB [ 2190.386172] sighand_cache 386KB 450KB [ 2190.387257] task_struct 1286KB 1968KB [ 2190.388340] cred_jar 124KB 204KB [ 2190.389469] anon_vma_chain 316KB 421KB [ 2190.390585] anon_vma 211KB 318KB [ 2190.391698] pid 54KB 67KB [ 2190.392814] Acpi-Operand 160KB 194KB [ 2190.393909] Acpi-ParseExt 27KB 27KB [ 2190.395021] Acpi-Parse 177KB 193KB [ 2190.396131] Acpi-State 153KB 169KB [ 2190.397233] Acpi-Namespace 24KB 24KB [ 2190.398325] shared_policy_node 8KB 8KB [ 2190.399419] numa_policy 7KB 7KB [ 2190.400513] trace_event_file 163KB 163KB [ 2190.401600] ftrace_event_field 280KB 280KB [ 2190.402701] pool_workqueue 48KB 48KB [ 2190.403775] task_group 16KB 16KB [ 2190.404860] vmap_area 397KB 397KB [ 2190.405950] page->ptl 254KB 378KB [ 2190.407028] kmemleak_scan_area 203KB 203KB [ 2190.409302] kmemleak_object 133551KB 157828KB [ 2190.410402] kmalloc-8k 4784KB 4960KB [ 2190.411490] kmalloc-4k 8440KB 8560KB [ 2190.412598] kmalloc-2k 5348KB 5696KB [ 2190.413693] kmalloc-1k 2828KB 3680KB [ 2190.414812] kmalloc-512 2763KB 5216KB [ 2190.415915] kmalloc-256 1335KB 1480KB [ 2190.417000] kmalloc-192 768KB 768KB [ 2190.418109] kmalloc-128 548KB 724KB [ 2190.419210] kmalloc-96 385KB 644KB [ 2190.420313] kmalloc-64 858KB 1348KB [ 2190.421421] kmalloc-32 747KB 876KB [ 2190.422513] kmalloc-16 353KB 384KB [ 2190.423597] kmalloc-8 305KB 338KB [ 2190.424686] kmem_cache_node 47KB 47KB [ 2190.425770] kmem_cache 75KB 75KB [ 2190.426856] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/rsyslog.service,task=in:imklog,pid=178,uid=0 [ 2190.430599] Out of memory (oom_kill_allocating_task): Killed process 174 (rsyslogd) total-vm:220876kB, anon-rss:1072kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:72kB oom_score_adj:0 [ 2190.457358] systemd-journal invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=-250 [ 2190.459728] CPU: 1 PID: 103 Comm: systemd-journal Not tainted 5.10.183 #1 [ 2190.461114] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2190.462767] Call Trace: [ 2190.463297] dump_stack+0x107/0x167 [ 2190.464024] dump_header+0x106/0x65e [ 2190.464783] oom_kill_process.cold+0x10/0x15 [ 2190.465665] out_of_memory+0x1149/0x1440 [ 2190.466502] ? oom_killer_disable+0x280/0x280 [ 2190.467403] ? mutex_trylock+0x237/0x2b0 [ 2190.468214] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2130 [ 2190.469403] __alloc_pages_slowpath.constprop.0+0x1b25/0x2130 [ 2190.470576] ? lock_acquire+0xd7/0x470 [ 2190.471358] ? warn_alloc+0x190/0x190 [ 2190.472141] __alloc_pages_nodemask+0x51d/0x600 [ 2190.473094] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2190.474306] ? find_get_entry+0x2c8/0x740 [ 2190.475142] alloc_pages_current+0x187/0x280 [ 2190.476017] __page_cache_alloc+0x2d2/0x360 [ 2190.476891] pagecache_get_page+0x2c7/0xc80 [ 2190.477754] filemap_fault+0x177d/0x2210 [ 2190.478680] ? read_cache_page_gfp+0x30/0x30 [ 2190.479586] ? replace_page_cache_page+0x1200/0x1200 [ 2190.480736] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2190.481921] ext4_filemap_fault+0x87/0xc0 [ 2190.482840] __do_fault+0x113/0x410 [ 2190.483568] handle_mm_fault+0x1e72/0x3520 [ 2190.484417] ? finish_task_switch+0x126/0x5d0 [ 2190.485315] ? find_held_lock+0x2c/0x110 [ 2190.486125] ? __pmd_alloc+0x5e0/0x5e0 [ 2190.486908] ? vmacache_find+0x55/0x2a0 [ 2190.487695] ? vmacache_update+0xce/0x140 [ 2190.488539] do_user_addr_fault+0x56e/0xc60 [ 2190.489409] exc_page_fault+0xa2/0x1a0 [ 2190.490185] ? asm_exc_page_fault+0x8/0x30 [ 2190.491042] asm_exc_page_fault+0x1e/0x30 [ 2190.491868] RIP: 0033:0x7f53ec0a9dbe [ 2190.492630] Code: Unable to access opcode bytes at RIP 0x7f53ec0a9d94. [ 2190.493936] RSP: 002b:00007fff0485ebd8 EFLAGS: 00010293 [ 2190.495004] RAX: 0005fe3f49b8a204 RBX: 000056197d0cb360 RCX: 0000000000000010 [ 2190.496435] RDX: 00007f53ec176560 RSI: 0000000000000000 RDI: 000056197d0cb4a8 [ 2190.497868] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 2190.499298] R10: 0000000000000009 R11: 0000000000000000 R12: 00007fff0485ec60 [ 2190.500737] R13: 0000000000000067 R14: 0000000000000000 R15: 00007fff0485ec60 [ 2190.502236] Mem-Info: [ 2190.502747] active_anon:37 inactive_anon:7759 isolated_anon:0 [ 2190.502747] active_file:12 inactive_file:22 isolated_file:0 [ 2190.502747] unevictable:0 dirty:0 writeback:0 [ 2190.502747] slab_reclaimable:6921 slab_unreclaimable:61545 [ 2190.502747] mapped:8715 shmem:94 pagetables:379 bounce:0 [ 2190.502747] free:3429 free_pcp:163 free_cma:0 [ 2190.508899] Node 0 active_anon:148kB inactive_anon:31036kB active_file:48kB inactive_file:88kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:34860kB dirty:0kB writeback:0kB shmem:376kB writeback_tmp:0kB kernel_stack:2880kB all_unreclaimable? no [ 2190.513400] Node 0 DMA free:6508kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2190.518570] lowmem_reserve[]: 0 1616 1616 1616 [ 2190.519538] Node 0 DMA32 free:6680kB min:5116kB low:6768kB high:8420kB reserved_highatomic:2048KB active_anon:148kB inactive_anon:31456kB active_file:96kB inactive_file:220kB unevictable:0kB writepending:0kB present:2080640kB managed:1660504kB mlocked:0kB pagetables:1516kB bounce:0kB free_pcp:880kB local_pcp:384kB free_cma:0kB [ 2190.525216] lowmem_reserve[]: 0 0 0 0 [ 2190.526007] Node 0 DMA: 1*4kB (U) 1*8kB (U) 0*16kB 1*32kB (U) 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6508kB [ 2190.528795] Node 0 DMA32: 738*4kB (UMEH) 254*8kB (UMEH) 49*16kB (UMEH) 22*32kB (UMH) 3*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 6664kB [ 2190.531726] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2190.533436] 132 total pagecache pages [ 2190.534207] 0 pages in swap cache [ 2190.534898] Swap cache stats: add 0, delete 0, find 0/0 [ 2190.535968] Free swap = 0kB [ 2190.536599] Total swap = 0kB [ 2190.537219] 524158 pages RAM [ 2190.537816] 0 pages HighMem/MovableOnly [ 2190.538617] 105055 pages reserved [ 2190.539325] Unreclaimable slab info: [ 2190.540058] Name Used Total [ 2190.541214] pid_3 7KB 7KB [ 2190.542288] pid_2 83KB 93KB [ 2190.543361] IEEE-802.15.4-MAC 63KB 63KB [ 2190.544436] IEEE-802.15.4-RAW 63KB 63KB [ 2190.545518] p9_req_t 8KB 8KB [ 2190.546598] ip6-frags 7KB 7KB [ 2190.547678] fib6_nodes 32KB 32KB [ 2190.548773] ip6_dst_cache 48KB 48KB [ 2190.549856] PINGv6 63KB 63KB [ 2190.550929] RAWv6 315KB 315KB [ 2190.552009] UDPLITEv6 62KB 62KB [ 2190.553112] UDPv6 62KB 62KB [ 2190.554197] tw_sock_TCPv6 7KB 7KB [ 2190.555282] request_sock_TCPv6 15KB 15KB [ 2190.556386] TCPv6 62KB 62KB [ 2190.557486] scsi_sense_cache 4KB 4KB [ 2190.558641] sd_ext_cdb 3KB 3KB [ 2190.559767] virtio_scsi_cmd 16KB 16KB [ 2190.560931] sgpool-128 89KB 178KB [ 2190.562095] sgpool-64 63KB 63KB [ 2190.563236] sgpool-32 803KB 803KB [ 2190.564382] sgpool-16 277KB 277KB [ 2190.565524] sgpool-8 168KB 168KB [ 2190.566649] io_kiocb 30KB 48KB [ 2190.567739] mqueue_inode_cache 62KB 62KB [ 2190.568852] nfs_commit_data 15KB 15KB [ 2190.569938] nfs_write_data 47KB 47KB [ 2190.571021] jbd2_inode 11KB 11KB [ 2190.572115] ext4_system_zone 7KB 7KB [ 2190.573231] ext4_io_end_vec 7KB 7KB [ 2190.574314] ext4_bio_post_read_ctx 15KB 15KB [ 2190.575486] kioctx 31KB 31KB [ 2190.576573] aio_kiocb 7KB 7KB [ 2190.577656] dio 92KB 92KB [ 2190.578739] bio-2 4KB 4KB [ 2190.579824] fasync_cache 7KB 7KB [ 2190.580932] pid_namespace 7KB 7KB [ 2190.582015] posix_timers_cache 15KB 15KB [ 2190.583117] rpc_buffers 31KB 31KB [ 2190.584196] rpc_tasks 3KB 3KB [ 2190.585300] UNIX 208KB 384KB [ 2190.586390] UDP-Lite 63KB 63KB [ 2190.587476] tcp_bind_bucket 8KB 8KB [ 2190.588562] inet_peer_cache 8KB 8KB [ 2190.589648] xfrm_state 32KB 32KB [ 2190.590727] ip_fib_trie 8KB 8KB [ 2190.591816] ip_fib_alias 15KB 15KB [ 2190.592926] ip_dst_cache 36KB 44KB [ 2190.594009] PING 62KB 62KB [ 2190.595101] RAW 93KB 93KB [ 2190.596186] UDP 378KB 378KB [ 2190.597271] tw_sock_TCP 15KB 15KB [ 2190.598358] request_sock_TCP 15KB 15KB [ 2190.599443] TCP 60KB 60KB [ 2190.600535] hugetlbfs_inode_cache 30KB 30KB [ 2190.601689] bio-1 11KB 11KB [ 2190.602767] eventpoll_pwq 23KB 23KB [ 2190.603847] eventpoll_epi 51KB 51KB [ 2190.604946] inotify_inode_mark 66KB 66KB [ 2190.606044] request_queue 90KB 90KB [ 2190.607124] blkdev_ioc 33KB 33KB [ 2190.608207] bio-0 584KB 584KB [ 2190.609304] biovec-max 756KB 867KB [ 2190.610387] biovec-64 1008KB 1008KB [ 2190.611474] biovec-16 176KB 176KB [ 2190.612581] user_namespace 31KB 31KB [ 2190.613663] uid_cache 8KB 8KB [ 2190.614747] dmaengine-unmap-2 4KB 4KB [ 2190.615823] audit_buffer 7KB 7KB [ 2190.616914] skbuff_fclone_cache 67KB 97KB [ 2190.618045] skbuff_head_cache 412KB 723KB [ 2190.619127] configfs_dir_cache 8KB 8KB [ 2190.620220] file_lock_cache 78KB 78KB [ 2190.621325] file_lock_ctx 7KB 7KB [ 2190.622403] fsnotify_mark_connector 32KB 32KB [ 2190.623581] net_namespace 132KB 172KB [ 2190.624680] task_delay_info 102KB 127KB [ 2190.625760] taskstats 100KB 100KB [ 2190.626846] proc_dir_entry 415KB 450KB [ 2190.627930] pde_opener 43KB 43KB [ 2190.629033] seq_file 60KB 63KB [ 2190.630112] sigqueue 110KB 110KB [ 2190.631195] shmem_inode_cache 1256KB 1477KB [ 2190.632275] kernfs_iattrs_cache 258KB 258KB [ 2190.633401] kernfs_node_cache 6091KB 6139KB [ 2190.634482] mnt_cache 236KB 236KB [ 2190.635584] filp 751KB 1470KB [ 2190.636700] names_cache 2834KB 3629KB [ 2190.637779] hashtab_node 274KB 274KB [ 2190.638857] ebitmap_node 1153KB 1153KB [ 2190.639937] avtab_node 4976KB 4976KB [ 2190.641027] avc_node 35KB 35KB [ 2190.642136] lsm_inode_cache 2635KB 3071KB [ 2190.643234] lsm_file_cache 191KB 220KB [ 2190.644311] key_jar 39KB 39KB [ 2190.645399] uts_namespace 15KB 15KB [ 2190.646471] nsproxy 7KB 7KB [ 2190.647586] vm_area_struct 1312KB 1576KB [ 2190.648684] mm_struct 344KB 472KB [ 2190.649767] fs_cache 60KB 60KB [ 2190.650842] files_cache 232KB 270KB [ 2190.651917] signal_cache 472KB 524KB [ 2190.653013] sighand_cache 386KB 450KB [ 2190.654248] task_struct 1227KB 1968KB [ 2190.655332] cred_jar 124KB 204KB [ 2190.656422] anon_vma_chain 311KB 421KB [ 2190.657531] anon_vma 210KB 318KB [ 2190.658616] pid 53KB 67KB [ 2190.659699] Acpi-Operand 160KB 194KB [ 2190.660795] Acpi-ParseExt 27KB 27KB [ 2190.661881] Acpi-Parse 177KB 193KB [ 2190.662966] Acpi-State 153KB 169KB [ 2190.664068] Acpi-Namespace 24KB 24KB [ 2190.665200] shared_policy_node 8KB 8KB [ 2190.666307] numa_policy 7KB 7KB [ 2190.667393] trace_event_file 163KB 163KB [ 2190.668495] ftrace_event_field 280KB 280KB [ 2190.669603] pool_workqueue 48KB 48KB [ 2190.670693] task_group 16KB 16KB [ 2190.671780] vmap_area 397KB 397KB [ 2190.672879] page->ptl 251KB 370KB [ 2190.673974] kmemleak_scan_area 203KB 203KB [ 2190.676346] kmemleak_object 133063KB 157782KB [ 2190.677477] kmalloc-8k 4784KB 4960KB [ 2190.678570] kmalloc-4k 8392KB 8560KB [ 2190.679663] kmalloc-2k 5292KB 5696KB [ 2190.680759] kmalloc-1k 2818KB 3680KB [ 2190.681894] kmalloc-512 2755KB 5216KB [ 2190.682987] kmalloc-256 1332KB 1480KB [ 2190.684093] kmalloc-192 768KB 768KB [ 2190.685224] kmalloc-128 548KB 724KB [ 2190.686327] kmalloc-96 383KB 644KB [ 2190.687435] kmalloc-64 857KB 1348KB [ 2190.688543] kmalloc-32 746KB 876KB [ 2190.689637] kmalloc-16 353KB 384KB [ 2190.690720] kmalloc-8 305KB 338KB [ 2190.691811] kmem_cache_node 47KB 47KB [ 2190.692892] kmem_cache 75KB 75KB [ 2190.693976] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-journald.service,task=systemd-journal,pid=103,uid=0 [ 2190.697833] Out of memory (oom_kill_allocating_task): Killed process 103 (systemd-journal) total-vm:31836kB, anon-rss:972kB, file-rss:0kB, shmem-rss:4kB, UID:0 pgtables:88kB oom_score_adj:-250 [ 2190.837308] systemd-rfkill invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2190.839589] CPU: 1 PID: 12825 Comm: systemd-rfkill Not tainted 5.10.183 #1 [ 2190.840994] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2190.842619] Call Trace: [ 2190.843155] dump_stack+0x107/0x167 [ 2190.843897] dump_header+0x106/0x65e [ 2190.844662] oom_kill_process.cold+0x10/0x15 [ 2190.845550] out_of_memory+0x1149/0x1440 [ 2190.846359] ? oom_killer_disable+0x280/0x280 [ 2190.847254] ? mutex_trylock+0x237/0x2b0 [ 2190.848056] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2130 [ 2190.849234] __alloc_pages_slowpath.constprop.0+0x1b25/0x2130 [ 2190.850398] ? lock_acquire+0xd7/0x470 [ 2190.851173] ? warn_alloc+0x190/0x190 [ 2190.851949] __alloc_pages_nodemask+0x51d/0x600 [ 2190.852885] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2190.854066] ? find_get_entry+0x2c8/0x740 [ 2190.854897] alloc_pages_current+0x187/0x280 [ 2190.855770] __page_cache_alloc+0x2d2/0x360 [ 2190.856642] pagecache_get_page+0x2c7/0xc80 [ 2190.857500] filemap_fault+0x177d/0x2210 [ 2190.858312] ? read_cache_page_gfp+0x30/0x30 [ 2190.859184] ? replace_page_cache_page+0x1200/0x1200 [ 2190.860179] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2190.861236] ext4_filemap_fault+0x87/0xc0 [ 2190.862046] __do_fault+0x113/0x410 [ 2190.862769] handle_mm_fault+0x1e72/0x3520 [ 2190.863607] ? find_held_lock+0x2c/0x110 [ 2190.864402] ? __pmd_alloc+0x5e0/0x5e0 [ 2190.865194] ? vmacache_find+0x55/0x2a0 [ 2190.865972] ? vmacache_update+0xce/0x140 [ 2190.866795] do_user_addr_fault+0x56e/0xc60 [ 2190.867658] exc_page_fault+0xa2/0x1a0 [ 2190.868435] ? asm_exc_page_fault+0x8/0x30 [ 2190.869277] asm_exc_page_fault+0x1e/0x30 [ 2190.870086] RIP: 0033:0x7f3d77d2c211 [ 2190.870818] Code: Unable to access opcode bytes at RIP 0x7f3d77d2c1e7. [ 2190.872111] RSP: 002b:00007ffd500a2398 EFLAGS: 00010212 [ 2190.873172] RAX: 0000000000000002 RBX: 0000000000000000 RCX: 0000000000000003 [ 2190.874570] RDX: 000000000000ffff RSI: 00007f3d7762a880 RDI: 00007f3d776a6930 [ 2190.875952] RBP: 0000000000000000 R08: 000000000000ffff R09: 000000000000000e [ 2190.877354] R10: 00007f3d77d31f28 R11: 0000000000000246 R12: 00007f3d77634000 [ 2190.878742] R13: 00007f3d7762a883 R14: 00007f3d77d3b060 R15: 00007f3d7780ef30 [ 2190.879211] syz-executor.5: page allocation failure: order:0, mode:0xcc0(GFP_KERNEL), nodemask=(null) [ 2190.880222] Mem-Info: [ 2190.880236] ,cpuset= [ 2190.882079] active_anon:37 inactive_anon:7507 isolated_anon:0 [ 2190.882079] active_file:28 inactive_file:1 isolated_file:0 [ 2190.882079] unevictable:0 dirty:0 writeback:0 [ 2190.882079] slab_reclaimable:6921 slab_unreclaimable:61414 [ 2190.882079] mapped:8715 shmem:94 pagetables:379 bounce:0 [ 2190.882079] free:2884 free_pcp:62 free_cma:0 [ 2190.883051] syz5 [ 2190.883443] Node 0 active_anon:148kB inactive_anon:30028kB active_file:112kB inactive_file:4kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:34860kB dirty:0kB writeback:0kB shmem:376kB writeback_tmp:0kB kernel_stack:2880kB all_unreclaimable? no [ 2190.883457] Node 0 DMA free:6484kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2190.889269] ,mems_allowed=0 [ 2190.889606] lowmem_reserve[]: 0 [ 2190.893784] [ 2190.893808] CPU: 0 PID: 12802 Comm: syz-executor.5 Not tainted 5.10.183 #1 [ 2190.898905] 1616 [ 2190.899580] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2190.899585] Call Trace: [ 2190.899615] dump_stack+0x107/0x167 [ 2190.900251] 1616 [ 2190.900560] warn_alloc.cold+0x95/0x18a [ 2190.901919] 1616 [ 2190.902283] ? zone_watermark_ok_safe+0x260/0x260 [ 2190.902304] ? schedule_timeout+0x1ce/0x380 [ 2190.903928] [ 2190.904372] ? usleep_range+0x170/0x170 [ 2190.904393] ? __next_timer_interrupt+0x2c0/0x2c0 [ 2190.905107] Node 0 [ 2190.905484] __alloc_pages_slowpath.constprop.0+0x1c80/0x2130 [ 2190.906273] DMA32 free:5052kB min:13308kB low:14960kB high:16612kB reserved_highatomic:2048KB active_anon:148kB inactive_anon:30448kB active_file:96kB inactive_file:220kB unevictable:0kB writepending:0kB present:2080640kB managed:1660504kB mlocked:0kB pagetables:1516kB bounce:0kB free_pcp:248kB local_pcp:0kB free_cma:0kB [ 2190.906613] ? lock_acquire+0xd7/0x470 [ 2190.907536] lowmem_reserve[]: [ 2190.908282] ? warn_alloc+0x190/0x190 [ 2190.908322] __alloc_pages_nodemask+0x51d/0x600 [ 2190.908619] 0 [ 2190.909313] ? asm_common_interrupt+0x1e/0x40 [ 2190.909336] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2190.910266] 0 [ 2190.910664] ? policy_nodemask+0x50/0x1a0 [ 2190.911788] 0 [ 2190.916600] ? __sanitizer_cov_trace_const_cmp2+0x4/0x20 [ 2190.916621] alloc_pages_current+0x187/0x280 [ 2190.917370] 0 [ 2190.917901] relay_open_buf.part.0+0x2a5/0xc00 [ 2190.918629] [ 2190.919452] relay_open+0x531/0xa10 [ 2190.919476] do_blk_trace_setup+0x4cf/0xc10 [ 2190.919807] Node 0 [ 2190.920603] ? _copy_from_user+0xfb/0x1b0 [ 2190.920621] __blk_trace_setup+0xca/0x180 [ 2190.921759] DMA: [ 2190.922070] ? do_blk_trace_setup+0xc10/0xc10 [ 2190.922857] 1*4kB [ 2190.923167] ? perf_trace_lock+0xac/0x490 [ 2190.923185] ? SOFTIRQ_verbose+0x10/0x10 [ 2190.924216] (U) [ 2190.924967] ? force_sigsegv+0x1d0/0x1d0 [ 2190.924987] ? __local_bh_enable_ip+0x9d/0x100 [ 2190.925349] 0*8kB [ 2190.926123] blk_trace_setup+0x43/0x60 [ 2190.926143] sg_ioctl_common+0x634/0x2570 [ 2190.926452] 1*16kB [ 2190.927083] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2190.927911] (U) [ 2190.928291] ? do_vfs_ioctl+0x283/0x10d0 [ 2190.928308] ? sg_write+0x120/0x120 [ 2190.929115] 0*32kB [ 2190.929819] ? generic_block_fiemap+0x60/0x60 [ 2190.930224] 1*64kB [ 2190.931009] ? restore_sigcontext+0x630/0x630 [ 2190.931432] (U) [ 2190.932133] ? _down_write_nest_lock+0x160/0x160 [ 2190.932150] ? down_read_trylock+0x193/0x350 [ 2190.932928] 0*128kB [ 2190.933289] ? selinux_file_ioctl+0xb6/0x270 [ 2190.933306] ? sg_compat_ioctl+0x120/0x120 [ 2190.934088] 1*256kB [ 2190.934858] sg_ioctl+0x8f/0x120 [ 2190.935281] (U) [ 2190.935936] __x64_sys_ioctl+0x19a/0x210 [ 2190.936750] 0*512kB [ 2190.937131] do_syscall_64+0x33/0x40 [ 2190.937152] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2190.938131] 0*1024kB [ 2190.938468] RIP: 0033:0x7fd989110b19 [ 2190.938488] Code: Unable to access opcode bytes at RIP 0x7fd989110aef. [ 2190.939261] 1*2048kB [ 2190.939862] RSP: 002b:00007fd986686188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2190.940313] (M) [ 2190.941072] RAX: ffffffffffffffda RBX: 00007fd989223f60 RCX: 00007fd989110b19 [ 2190.941087] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000003 [ 2190.941523] 1*4096kB [ 2190.942271] RBP: 00007fd98916af6d R08: 0000000000000000 R09: 0000000000000000 [ 2190.942280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2190.942295] R13: 00007ffe527e7fff R14: 00007fd986686300 R15: 0000000000022000 [ 2190.942669] (M) [ 2190.943525] Mem-Info: [ 2190.944349] = 6484kB [ 2190.944779] active_anon:37 inactive_anon:7507 isolated_anon:0 [ 2190.944779] active_file:28 inactive_file:1 isolated_file:0 [ 2190.944779] unevictable:0 dirty:0 writeback:0 [ 2190.944779] slab_reclaimable:6921 slab_unreclaimable:61414 [ 2190.944779] mapped:8715 shmem:94 pagetables:379 bounce:0 [ 2190.944779] free:2884 free_pcp:62 free_cma:0 [ 2190.945603] Node 0 DMA32: [ 2190.946377] Node 0 active_anon:148kB inactive_anon:30028kB active_file:112kB inactive_file:4kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:34860kB dirty:0kB writeback:0kB shmem:376kB writeback_tmp:0kB kernel_stack:2880kB all_unreclaimable? no [ 2190.946802] 640*4kB [ 2190.947390] Node 0 [ 2190.947770] (MEH) [ 2190.948521] DMA free:6484kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2190.948928] 181*8kB (UMEH) [ 2190.949598] lowmem_reserve[]: [ 2190.950586] 28*16kB (UMH) [ 2190.951004] 0 1616 [ 2190.951734] 12*32kB (H) [ 2190.952909] 1616 [ 2190.953387] 3*64kB (H) [ 2190.954715] 1616 [ 2190.955114] 0*128kB 0*256kB [ 2190.956368] [ 2190.957776] 0*512kB [ 2190.958215] Node 0 [ 2190.959596] 0*1024kB 0*2048kB [ 2190.960888] DMA32 free:5052kB min:13308kB low:14960kB high:16612kB reserved_highatomic:2048KB active_anon:148kB inactive_anon:30448kB active_file:96kB inactive_file:220kB unevictable:0kB writepending:0kB present:2080640kB managed:1660504kB mlocked:0kB pagetables:1516kB bounce:0kB free_pcp:248kB local_pcp:248kB free_cma:0kB [ 2190.962249] 0*4096kB = 5032kB [ 2190.962594] lowmem_reserve[]: 0 [ 2190.963080] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2190.963491] 0 [ 2190.969267] 132 total pagecache pages [ 2190.969725] 0 0 [ 2190.974018] 0 pages in swap cache [ 2190.974032] Swap cache stats: add 0, delete 0, find 0/0 [ 2190.974427] [ 2190.974847] Free swap = 0kB [ 2190.975224] Node 0 [ 2190.979961] Total swap = 0kB [ 2190.979972] 524158 pages RAM [ 2190.980465] DMA: [ 2190.981047] 0 pages HighMem/MovableOnly [ 2190.981057] 105055 pages reserved [ 2190.981534] 1*4kB (U) [ 2190.981964] Unreclaimable slab info: [ 2190.982417] 0*8kB 1*16kB [ 2190.982816] Name Used Total [ 2190.982831] pid_3 7KB 7KB [ 2190.983270] (U) [ 2190.983663] pid_2 83KB 93KB [ 2190.984162] 0*32kB [ 2190.984473] IEEE-802.15.4-MAC 63KB 63KB [ 2190.984859] 1*64kB (U) [ 2190.985312] IEEE-802.15.4-RAW 63KB 63KB [ 2190.985818] 0*128kB 1*256kB [ 2190.991105] p9_req_t 8KB 8KB [ 2190.991599] (U) 0*512kB [ 2190.992236] ip6-frags 7KB 7KB [ 2190.993613] 0*1024kB [ 2190.993954] fib6_nodes 32KB 32KB [ 2190.994580] 1*2048kB [ 2190.994952] ip6_dst_cache 48KB 48KB [ 2190.995525] (M) [ 2190.996552] PINGv6 63KB 63KB [ 2190.996812] 1*4096kB (M) [ 2190.997403] RAWv6 315KB 315KB [ 2190.997416] UDPLITEv6 62KB 62KB [ 2190.997768] = 6484kB [ 2190.997779] Node 0 [ 2190.998381] UDPv6 62KB 62KB [ 2190.998394] tw_sock_TCPv6 7KB 7KB [ 2190.998862] DMA32: 640*4kB [ 2190.999283] request_sock_TCPv6 15KB 15KB [ 2190.999296] TCPv6 62KB 62KB [ 2190.999931] (MEH) 181*8kB [ 2191.000630] scsi_sense_cache 4KB 4KB [ 2191.001019] (UMEH) 28*16kB [ 2191.001751] sd_ext_cdb 3KB 3KB [ 2191.001764] virtio_scsi_cmd 16KB 16KB [ 2191.002220] (UMH) [ 2191.003273] sgpool-128 89KB 178KB [ 2191.004138] 12*32kB [ 2191.004538] sgpool-64 63KB 63KB [ 2191.005411] (H) [ 2191.005844] sgpool-32 803KB 803KB [ 2191.006718] 3*64kB [ 2191.007233] sgpool-16 277KB 277KB [ 2191.008068] (H) [ 2191.008675] sgpool-8 168KB 168KB [ 2191.009549] 0*128kB [ 2191.010047] io_kiocb 30KB 48KB [ 2191.010956] 0*256kB [ 2191.011426] mqueue_inode_cache 62KB 62KB [ 2191.012340] 0*512kB [ 2191.012799] nfs_commit_data 15KB 15KB [ 2191.013717] 0*1024kB [ 2191.014105] nfs_write_data 47KB 47KB [ 2191.014998] 0*2048kB 0*4096kB [ 2191.015547] jbd2_inode 11KB 11KB [ 2191.016464] = 5032kB [ 2191.017485] ext4_system_zone 7KB 7KB [ 2191.017878] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2191.018305] ext4_io_end_vec 7KB 7KB [ 2191.018318] ext4_bio_post_read_ctx 15KB 15KB [ 2191.019226] 132 total pagecache pages [ 2191.019236] 0 pages in swap cache [ 2191.020242] kioctx 31KB 31KB [ 2191.020751] Swap cache stats: add 0, delete 0, find 0/0 [ 2191.020761] Free swap = 0kB [ 2191.021782] aio_kiocb 7KB 7KB [ 2191.021796] dio 92KB 92KB [ 2191.022711] Total swap = 0kB [ 2191.023261] bio-2 4KB 4KB [ 2191.024167] 524158 pages RAM [ 2191.024732] fasync_cache 7KB 7KB [ 2191.025647] 0 pages HighMem/MovableOnly [ 2191.026652] pid_namespace 7KB 7KB [ 2191.027011] 105055 pages reserved [ 2191.057312] posix_timers_cache 15KB 15KB [ 2191.058318] rpc_buffers 31KB 31KB [ 2191.059302] rpc_tasks 3KB 3KB [ 2191.060298] UNIX 208KB 384KB [ 2191.061298] UDP-Lite 63KB 63KB [ 2191.062289] tcp_bind_bucket 8KB 8KB [ 2191.063286] inet_peer_cache 8KB 8KB [ 2191.064275] xfrm_state 32KB 32KB [ 2191.065278] ip_fib_trie 8KB 8KB [ 2191.066266] ip_fib_alias 15KB 15KB [ 2191.067259] ip_dst_cache 36KB 44KB [ 2191.068253] PING 62KB 62KB [ 2191.069251] RAW 93KB 93KB [ 2191.070241] UDP 378KB 378KB [ 2191.071227] tw_sock_TCP 15KB 15KB [ 2191.072200] request_sock_TCP 15KB 15KB [ 2191.073203] TCP 60KB 60KB [ 2191.074183] hugetlbfs_inode_cache 30KB 30KB [ 2191.075227] bio-1 11KB 11KB [ 2191.076224] eventpoll_pwq 23KB 23KB [ 2191.077214] eventpoll_epi 51KB 51KB [ 2191.078195] inotify_inode_mark 66KB 66KB [ 2191.079191] request_queue 90KB 90KB [ 2191.080167] blkdev_ioc 33KB 33KB [ 2191.081180] bio-0 584KB 584KB [ 2191.082170] biovec-max 756KB 867KB [ 2191.083153] biovec-64 1008KB 1008KB [ 2191.084131] biovec-16 176KB 176KB [ 2191.085198] user_namespace 31KB 31KB [ 2191.086176] uid_cache 8KB 8KB [ 2191.087155] dmaengine-unmap-2 4KB 4KB [ 2191.088129] audit_buffer 7KB 7KB [ 2191.089119] skbuff_fclone_cache 67KB 97KB [ 2191.090150] skbuff_head_cache 428KB 723KB [ 2191.091140] configfs_dir_cache 8KB 8KB [ 2191.092135] file_lock_cache 78KB 78KB [ 2191.093120] file_lock_ctx 7KB 7KB [ 2191.094068] fsnotify_mark_connector 32KB 32KB [ 2191.095141] net_namespace 132KB 172KB [ 2191.096124] task_delay_info 101KB 123KB [ 2191.097107] taskstats 100KB 100KB [ 2191.098068] proc_dir_entry 415KB 450KB [ 2191.099043] pde_opener 43KB 43KB [ 2191.100019] seq_file 60KB 63KB [ 2191.100993] sigqueue 110KB 110KB [ 2191.101971] shmem_inode_cache 1255KB 1477KB [ 2191.102945] kernfs_iattrs_cache 258KB 258KB [ 2191.103955] kernfs_node_cache 6091KB 6139KB [ 2191.104939] mnt_cache 236KB 236KB [ 2191.105930] filp 708KB 1417KB [ 2191.106914] names_cache 2834KB 3629KB [ 2191.107880] hashtab_node 274KB 274KB [ 2191.108858] ebitmap_node 1153KB 1153KB [ 2191.109827] avtab_node 4976KB 4976KB [ 2191.110805] avc_node 35KB 35KB [ 2191.111809] lsm_inode_cache 2632KB 3071KB [ 2191.112797] lsm_file_cache 191KB 220KB [ 2191.113765] key_jar 39KB 39KB [ 2191.114732] uts_namespace 15KB 15KB [ 2191.115687] nsproxy 7KB 7KB [ 2191.116681] vm_area_struct 1142KB 1484KB [ 2191.117651] mm_struct 341KB 472KB [ 2191.118605] fs_cache 60KB 60KB [ 2191.119565] files_cache 231KB 270KB [ 2191.120533] signal_cache 468KB 524KB [ 2191.121491] sighand_cache 386KB 450KB [ 2191.122457] task_struct 1141KB 1916KB [ 2191.123417] cred_jar 122KB 204KB [ 2191.124397] anon_vma_chain 292KB 413KB [ 2191.125374] anon_vma 204KB 306KB [ 2191.126329] pid 53KB 67KB [ 2191.127301] Acpi-Operand 160KB 194KB [ 2191.128260] Acpi-ParseExt 27KB 27KB [ 2191.129231] Acpi-Parse 177KB 193KB [ 2191.130200] Acpi-State 153KB 169KB [ 2191.131159] Acpi-Namespace 24KB 24KB [ 2191.132124] shared_policy_node 8KB 8KB [ 2191.133148] numa_policy 7KB 7KB [ 2191.134109] trace_event_file 163KB 163KB [ 2191.135036] ftrace_event_field 280KB 280KB [ 2191.135996] pool_workqueue 48KB 48KB [ 2191.136953] task_group 16KB 16KB [ 2191.137896] vmap_area 397KB 397KB [ 2191.138850] page->ptl 231KB 354KB [ 2191.139801] kmemleak_scan_area 203KB 203KB [ 2191.142108] kmemleak_object 132053KB 157676KB [ 2191.143046] kmalloc-8k 4784KB 4960KB [ 2191.143990] kmalloc-4k 8344KB 8560KB [ 2191.144960] kmalloc-2k 5208KB 5696KB [ 2191.145911] kmalloc-1k 2856KB 3680KB [ 2191.146896] kmalloc-512 2787KB 5200KB [ 2191.147857] kmalloc-256 1331KB 1480KB [ 2191.148815] kmalloc-192 768KB 768KB [ 2191.149784] kmalloc-128 545KB 724KB [ 2191.150745] kmalloc-96 380KB 644KB [ 2191.151719] kmalloc-64 853KB 1340KB [ 2191.152681] kmalloc-32 739KB 876KB [ 2191.153640] kmalloc-16 353KB 384KB [ 2191.154579] kmalloc-8 304KB 338KB [ 2191.155534] kmem_cache_node 47KB 47KB [ 2191.156483] kmem_cache 75KB 75KB [ 2191.157435] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-rfkill.service,task=systemd-rfkill,pid=12825,uid=0 [ 2191.160341] Out of memory (oom_kill_allocating_task): Killed process 12825 (systemd-rfkill) total-vm:12320kB, anon-rss:240kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:56kB oom_score_adj:0 [ 2191.248695] systemd[1]: rsyslog.service: A process of this unit has been killed by the OOM killer. [ 2191.250847] systemd[1]: ssh.service: A process of this unit has been killed by the OOM killer. [ 2191.258445] systemd[1]: systemd-journald.service: Main process exited, code=killed, status=9/KILL [ 2191.263742] systemd[1]: systemd-journald.service: Failed with result 'oom-kill'. [ 2191.293516] systemd[1]: systemd-journald.service: Consumed 7.430s CPU time. [ 2191.306983] systemd[1]: rsyslog.service: Main process exited, code=killed, status=9/KILL [ 2191.309458] systemd[1]: rsyslog.service: Failed with result 'oom-kill'. [ 2191.325406] systemd[1]: rsyslog.service: Consumed 1.183s CPU time. [ 2191.328614] systemd[1]: systemd-rfkill.service: Main process exited, code=killed, status=9/KILL [ 2191.330798] systemd[1]: systemd-rfkill.service: Failed with result 'oom-kill'. [ 2191.343425] systemd[1]: Failed to start Load/Save RF Kill Switch Status. [ 2191.346429] systemd[1]: ssh.service: Control process exited, code=killed, status=9/KILL [ 2191.347457] systemd[1]: ssh.service: Failed with result 'oom-kill'. [ 2191.366200] systemd[1]: Failed to start OpenBSD Secure Shell server. [ 2191.369577] systemd[1]: ssh.service: Consumed 1.072s CPU time. [ 2191.371466] systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. [ 2191.403115] systemd[1]: Stopping Flush Journal to Persistent Storage... [ 2191.439264] systemd[1]: Starting Load/Save RF Kill Switch Status... [ 2191.441068] systemd[1]: rsyslog.service: Scheduled restart job, restart counter is at 1. [ 2191.442271] systemd[1]: Stopped System Logging Service. [ 2191.443151] systemd[1]: rsyslog.service: Consumed 1.183s CPU time. [ 2191.472338] systemd[1]: Starting System Logging Service... [ 2191.473916] systemd[1]: ssh.service: Scheduled restart job, restart counter is at 2. [ 2191.474810] systemd[1]: Stopped OpenBSD Secure Shell server. [ 2191.475711] systemd[1]: ssh.service: Consumed 1.072s CPU time. [ 2191.509869] systemd[1]: Starting OpenBSD Secure Shell server... [ 2191.674579] systemd[1]: Started System Logging Service. [ 2191.682369] systemd[1]: Started Load/Save RF Kill Switch Status. [ 2191.876712] sshd invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2191.877702] CPU: 0 PID: 12841 Comm: sshd Not tainted 5.10.183 #1 [ 2191.878312] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2191.879143] Call Trace: [ 2191.879417] dump_stack+0x107/0x167 [ 2191.879793] dump_header+0x106/0x65e [ 2191.880176] oom_kill_process.cold+0x10/0x15 [ 2191.880628] out_of_memory+0x1149/0x1440 [ 2191.881042] ? oom_killer_disable+0x280/0x280 [ 2191.881494] ? mutex_trylock+0x237/0x2b0 [ 2191.881910] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2130 [ 2191.882504] __alloc_pages_slowpath.constprop.0+0x1b25/0x2130 [ 2191.883099] ? lock_acquire+0xd7/0x470 [ 2191.883494] ? warn_alloc+0x190/0x190 [ 2191.883890] __alloc_pages_nodemask+0x51d/0x600 [ 2191.884361] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2191.884976] ? find_get_entry+0x2c8/0x740 [ 2191.885399] alloc_pages_current+0x187/0x280 [ 2191.885849] __page_cache_alloc+0x2d2/0x360 [ 2191.886284] pagecache_get_page+0x2c7/0xc80 [ 2191.886719] filemap_fault+0x177d/0x2210 [ 2191.887135] ? read_cache_page_gfp+0x30/0x30 [ 2191.887579] ? handle_mm_fault+0x28d0/0x3520 [ 2191.888019] ? lock_downgrade+0x6d0/0x6d0 [ 2191.888441] ext4_filemap_fault+0x87/0xc0 [ 2191.888867] __do_fault+0x113/0x410 [ 2191.889235] handle_mm_fault+0x1e72/0x3520 [ 2191.889660] ? find_held_lock+0x2c/0x110 [ 2191.890069] ? __pmd_alloc+0x5e0/0x5e0 [ 2191.890462] ? vmacache_find+0x55/0x2a0 [ 2191.890867] do_user_addr_fault+0x56e/0xc60 [ 2191.891306] exc_page_fault+0xa2/0x1a0 [ 2191.891697] ? asm_exc_page_fault+0x8/0x30 [ 2191.892122] asm_exc_page_fault+0x1e/0x30 [ 2191.892547] RIP: 0033:0x7fde74564cb0 [ 2191.892923] Code: Unable to access opcode bytes at RIP 0x7fde74564c86. [ 2191.893578] RSP: 002b:00007ffc21b91c58 EFLAGS: 00010202 [ 2191.894110] RAX: 0000000000000001 RBX: 00007fde7466a9e0 RCX: 0000000000000000 [ 2191.894823] RDX: 0000000000000001 RSI: 0000000000000018 RDI: 000055ba4ed16a90 [ 2191.895533] RBP: 00007fde747cc7fc R08: 000055ba4ed16a90 R09: 0000000000000000 [ 2191.896250] R10: 000055ba4ed1ca90 R11: 0000000000000000 R12: 00007ffc21b91c80 [ 2191.896969] R13: 000055ba4ed16820 R14: 000055ba4dd69030 R15: 0000000000000000 [ 2191.897770] Mem-Info: [ 2191.898036] active_anon:34 inactive_anon:7986 isolated_anon:0 [ 2191.898036] active_file:25 inactive_file:20 isolated_file:0 [ 2191.898036] unevictable:0 dirty:0 writeback:0 [ 2191.898036] slab_reclaimable:6820 slab_unreclaimable:60937 [ 2191.898036] mapped:8726 shmem:94 pagetables:410 bounce:0 [ 2191.898036] free:2216 free_pcp:62 free_cma:0 [ 2191.901299] Node 0 active_anon:136kB inactive_anon:31944kB active_file:100kB inactive_file:80kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:34904kB dirty:0kB writeback:0kB shmem:376kB writeback_tmp:0kB kernel_stack:3104kB all_unreclaimable? no [ 2191.903762] Node 0 DMA free:6484kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:320kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2191.906605] lowmem_reserve[]: 0 1616 1616 1616 [ 2191.907141] Node 0 DMA32 free:2380kB min:5116kB low:6768kB high:8420kB reserved_highatomic:2048KB active_anon:136kB inactive_anon:31584kB active_file:228kB inactive_file:476kB unevictable:0kB writepending:124kB present:2080640kB managed:1660504kB mlocked:0kB pagetables:1640kB bounce:0kB free_pcp:248kB local_pcp:0kB free_cma:0kB [ 2191.910260] lowmem_reserve[]: 0 0 0 0 [ 2191.910691] Node 0 DMA: 13*4kB (UM) 14*8kB (M) 15*16kB (UM) 10*32kB (M) 8*64kB (M) 3*128kB (UM) 1*256kB (M) 1*512kB (U) 0*1024kB 0*2048kB 1*4096kB (M) = 6484kB [ 2191.912335] Node 0 DMA32: 208*4kB (UMH) 74*8kB (UMH) 26*16kB (UH) 15*32kB (H) 5*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 2640kB [ 2191.913869] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2191.914789] 122 total pagecache pages [ 2191.915217] 0 pages in swap cache [ 2191.915592] Swap cache stats: add 0, delete 0, find 0/0 [ 2191.916189] Free swap = 0kB [ 2191.916529] Total swap = 0kB [ 2191.916850] 524158 pages RAM [ 2191.917187] 0 pages HighMem/MovableOnly [ 2191.917609] 105055 pages reserved [ 2191.917977] Unreclaimable slab info: [ 2191.918394] Name Used Total [ 2191.918996] pid_3 7KB 7KB [ 2191.919589] pid_2 79KB 93KB [ 2191.920196] IEEE-802.15.4-MAC 63KB 63KB [ 2191.920802] IEEE-802.15.4-RAW 63KB 63KB [ 2191.921421] p9_req_t 8KB 8KB [ 2191.922030] ip6-frags 7KB 7KB [ 2191.922646] fib6_nodes 32KB 32KB [ 2191.923265] ip6_dst_cache 48KB 48KB [ 2191.923869] PINGv6 63KB 63KB [ 2191.924488] RAWv6 315KB 315KB [ 2191.925124] UDPLITEv6 62KB 62KB [ 2191.925725] UDPv6 62KB 62KB [ 2191.926351] tw_sock_TCPv6 7KB 7KB [ 2191.926966] request_sock_TCPv6 15KB 15KB [ 2191.927610] TCPv6 62KB 62KB [ 2191.928265] scsi_sense_cache 4KB 4KB [ 2191.928890] sd_ext_cdb 3KB 3KB [ 2191.929521] virtio_scsi_cmd 16KB 16KB [ 2191.930144] sgpool-128 89KB 178KB [ 2191.930750] sgpool-64 63KB 63KB [ 2191.931401] sgpool-32 819KB 819KB [ 2191.932014] sgpool-16 285KB 285KB [ 2191.932665] sgpool-8 180KB 180KB [ 2191.933305] io_kiocb 30KB 48KB [ 2191.933931] mqueue_inode_cache 62KB 62KB [ 2191.934575] nfs_commit_data 15KB 15KB [ 2191.935208] nfs_write_data 47KB 47KB [ 2191.935837] jbd2_inode 11KB 11KB [ 2191.936477] ext4_system_zone 7KB 7KB [ 2191.937150] ext4_io_end_vec 7KB 7KB [ 2191.937777] ext4_bio_post_read_ctx 15KB 15KB [ 2191.938469] kioctx 31KB 31KB [ 2191.939093] aio_kiocb 7KB 7KB [ 2191.939707] dio 92KB 92KB [ 2191.940357] bio-2 4KB 4KB [ 2191.940981] fasync_cache 7KB 7KB [ 2191.941609] pid_namespace 7KB 7KB [ 2191.942246] posix_timers_cache 15KB 15KB [ 2191.942861] rpc_buffers 31KB 31KB [ 2191.943504] rpc_tasks 3KB 3KB [ 2191.944125] UNIX 262KB 384KB [ 2191.944758] UDP-Lite 63KB 63KB [ 2191.945392] tcp_bind_bucket 8KB 8KB [ 2191.946004] inet_peer_cache 8KB 8KB [ 2191.946651] xfrm_state 32KB 32KB [ 2191.947301] ip_fib_trie 8KB 8KB [ 2191.947918] ip_fib_alias 15KB 15KB [ 2191.948560] ip_dst_cache 36KB 44KB [ 2191.949184] PING 62KB 62KB [ 2191.949820] RAW 93KB 93KB [ 2191.950460] UDP 378KB 378KB [ 2191.951113] tw_sock_TCP 15KB 15KB [ 2191.951720] request_sock_TCP 15KB 15KB [ 2191.952373] TCP 60KB 60KB [ 2191.953008] hugetlbfs_inode_cache 30KB 30KB [ 2191.953687] bio-1 11KB 11KB [ 2191.954321] eventpoll_pwq 23KB 23KB [ 2191.954936] eventpoll_epi 51KB 51KB [ 2191.955562] inotify_inode_mark 66KB 66KB [ 2191.956220] request_queue 90KB 90KB [ 2191.956849] blkdev_ioc 33KB 33KB [ 2191.957490] bio-0 596KB 596KB [ 2191.958148] biovec-max 777KB 867KB [ 2191.958813] biovec-64 986KB 992KB [ 2191.959439] biovec-16 183KB 183KB [ 2191.960085] user_namespace 31KB 31KB [ 2191.960707] uid_cache 8KB 8KB [ 2191.961355] dmaengine-unmap-2 4KB 4KB [ 2191.961958] audit_buffer 7KB 7KB [ 2191.962598] skbuff_fclone_cache 67KB 97KB [ 2191.963301] skbuff_head_cache 430KB 637KB [ 2191.963955] configfs_dir_cache 8KB 8KB [ 2191.964628] file_lock_cache 78KB 78KB [ 2191.965281] file_lock_ctx 7KB 7KB [ 2191.965892] fsnotify_mark_connector 32KB 32KB [ 2191.966600] net_namespace 132KB 172KB [ 2191.967220] task_delay_info 98KB 111KB [ 2191.967839] taskstats 100KB 100KB [ 2191.968482] proc_dir_entry 380KB 427KB [ 2191.969132] pde_opener 43KB 43KB [ 2191.969762] seq_file 60KB 63KB [ 2191.970406] sigqueue 110KB 110KB [ 2191.971011] shmem_inode_cache 1233KB 1477KB [ 2191.971645] kernfs_iattrs_cache 262KB 262KB [ 2191.972320] kernfs_node_cache 5820KB 5935KB [ 2191.972954] mnt_cache 236KB 236KB [ 2191.973603] filp 1005KB 1305KB [ 2191.974246] names_cache 7157KB 7467KB [ 2191.974869] hashtab_node 274KB 274KB [ 2191.975492] ebitmap_node 1153KB 1153KB [ 2191.976142] avtab_node 4976KB 4976KB [ 2191.976780] avc_node 35KB 35KB [ 2191.977440] lsm_inode_cache 2641KB 3047KB [ 2191.978100] lsm_file_cache 191KB 216KB [ 2191.978725] key_jar 39KB 39KB [ 2191.979364] uts_namespace 15KB 15KB [ 2191.979996] nsproxy 7KB 7KB [ 2191.980674] vm_area_struct 1136KB 1316KB [ 2191.981318] mm_struct 329KB 441KB [ 2191.981943] fs_cache 60KB 60KB [ 2191.982588] files_cache 226KB 270KB [ 2191.983223] signal_cache 448KB 524KB [ 2191.983850] sighand_cache 386KB 450KB [ 2191.984493] task_struct 853KB 1365KB [ 2191.985141] cred_jar 142KB 184KB [ 2191.985751] anon_vma_chain 272KB 362KB [ 2191.986392] anon_vma 213KB 282KB [ 2191.987027] pid 53KB 67KB [ 2191.987675] Acpi-Operand 160KB 194KB [ 2191.988326] Acpi-ParseExt 27KB 27KB [ 2191.988964] Acpi-Parse 177KB 193KB [ 2191.989597] Acpi-State 153KB 169KB [ 2191.990240] Acpi-Namespace 24KB 24KB [ 2191.990870] shared_policy_node 8KB 8KB [ 2191.991524] numa_policy 7KB 7KB [ 2191.992172] trace_event_file 163KB 163KB [ 2191.992809] ftrace_event_field 280KB 280KB [ 2191.993470] pool_workqueue 48KB 48KB [ 2191.994118] task_group 16KB 16KB [ 2191.994731] vmap_area 158KB 181KB [ 2191.995323] page->ptl 166KB 220KB [ 2191.995902] kmemleak_scan_area 89KB 131KB [ 2191.997621] kmemleak_object 129844KB 154373KB [ 2191.998223] kmalloc-8k 4304KB 4576KB [ 2191.998808] kmalloc-4k 7008KB 8464KB [ 2191.999410] kmalloc-2k 4604KB 5632KB [ 2191.999990] kmalloc-1k 2684KB 3680KB [ 2192.000628] kmalloc-512 2723KB 5072KB [ 2192.001227] kmalloc-256 1315KB 1480KB [ 2192.001803] kmalloc-192 753KB 768KB [ 2192.002407] kmalloc-128 534KB 724KB [ 2192.002994] kmalloc-96 366KB 644KB [ 2192.003611] kmalloc-64 836KB 1328KB [ 2192.004208] kmalloc-32 742KB 876KB [ 2192.004836] kmalloc-16 352KB 384KB [ 2192.005464] kmalloc-8 296KB 330KB [ 2192.006037] kmem_cache_node 47KB 47KB [ 2192.006625] kmem_cache 75KB 75KB [ 2192.007219] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/ssh.service,task=sshd,pid=12841,uid=0 [ 2192.008872] Out of memory (oom_kill_allocating_task): Killed process 12841 (sshd) total-vm:13080kB, anon-rss:684kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:60kB oom_score_adj:0 [ 2192.014549] in:imklog invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2192.015680] CPU: 1 PID: 12843 Comm: in:imklog Not tainted 5.10.183 #1 [ 2192.016410] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2192.017491] Call Trace: [ 2192.017792] dump_stack+0x107/0x167 [ 2192.018206] dump_header+0x106/0x65e [ 2192.018625] oom_kill_process.cold+0x10/0x15 [ 2192.019121] out_of_memory+0x1149/0x1440 [ 2192.019575] ? oom_killer_disable+0x280/0x280 [ 2192.020077] ? mutex_trylock+0x237/0x2b0 [ 2192.020540] ? __alloc_pages_slowpath.constprop.0+0xb0e/0x2130 [ 2192.021206] __alloc_pages_slowpath.constprop.0+0x1b25/0x2130 [ 2192.021865] ? lock_acquire+0xd7/0x470 [ 2192.022300] ? warn_alloc+0x190/0x190 [ 2192.022734] __alloc_pages_nodemask+0x51d/0x600 [ 2192.023256] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2192.023925] ? find_get_entry+0x2c8/0x740 [ 2192.024388] alloc_pages_current+0x187/0x280 [ 2192.024892] __page_cache_alloc+0x2d2/0x360 [ 2192.025393] pagecache_get_page+0x2c7/0xc80 [ 2192.025876] filemap_fault+0x177d/0x2210 [ 2192.026334] ? read_cache_page_gfp+0x30/0x30 [ 2192.026822] ? replace_page_cache_page+0x1200/0x1200 [ 2192.027386] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2192.027974] ext4_filemap_fault+0x87/0xc0 [ 2192.028446] __do_fault+0x113/0x410 [ 2192.028842] handle_mm_fault+0x1e72/0x3520 [ 2192.029295] ? fsnotify+0xf50/0xf50 [ 2192.029693] ? __pmd_alloc+0x5e0/0x5e0 [ 2192.030129] ? vmacache_find+0x55/0x2a0 [ 2192.030550] ? vmacache_update+0xce/0x140 [ 2192.030993] do_user_addr_fault+0x56e/0xc60 [ 2192.031463] exc_page_fault+0xa2/0x1a0 [ 2192.031883] ? asm_exc_page_fault+0x8/0x30 [ 2192.032341] asm_exc_page_fault+0x1e/0x30 [ 2192.032788] RIP: 0033:0x7f034e76908c [ 2192.033185] Code: Unable to access opcode bytes at RIP 0x7f034e769062. [ 2192.033892] RSP: 002b:00007f034dd054d0 EFLAGS: 00010246 [ 2192.034467] RAX: 0000000000001f5f RBX: 0000000000000000 RCX: 00007f034e76908c [ 2192.035228] RDX: 0000000000001fa0 RSI: 00007f034dd05d00 RDI: 0000000000000005 [ 2192.035989] RBP: 000055d431c7f4c0 R08: 0000000000000000 R09: 0000000000000000 [ 2192.036765] R10: a3d70a3d70a3d70b R11: 0000000000000246 R12: 00007f034dd05d00 [ 2192.037534] R13: 0000000000001fa0 R14: 00007f034dd05d00 R15: 00007f034dd06e93 [ 2192.038375] Mem-Info: [ 2192.038651] active_anon:35 inactive_anon:7792 isolated_anon:0 [ 2192.038651] active_file:12 inactive_file:21 isolated_file:0 [ 2192.038651] unevictable:0 dirty:0 writeback:0 [ 2192.038651] slab_reclaimable:6794 slab_unreclaimable:60932 [ 2192.038651] mapped:8705 shmem:69 pagetables:383 bounce:0 [ 2192.038651] free:12172 free_pcp:410 free_cma:0 [ 2192.041914] Node 0 active_anon:140kB inactive_anon:31168kB active_file:48kB inactive_file:84kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:34820kB dirty:0kB writeback:0kB shmem:276kB writeback_tmp:0kB kernel_stack:3072kB all_unreclaimable? no [ 2192.044292] Node 0 DMA free:6484kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2192.047006] lowmem_reserve[]: 0 1616 1616 1616 [ 2192.047524] Node 0 DMA32 free:125868kB min:5116kB low:6768kB high:8420kB reserved_highatomic:2048KB active_anon:140kB inactive_anon:31604kB active_file:48kB inactive_file:84kB unevictable:0kB writepending:0kB present:2080640kB managed:1660504kB mlocked:0kB pagetables:1528kB bounce:0kB free_pcp:1672kB local_pcp:248kB free_cma:0kB [ 2192.050540] lowmem_reserve[]: 0 0 0 0 [ 2192.050964] Node 0 DMA: 1*4kB (U) 0*8kB 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6484kB [ 2192.052414] Node 0 DMA32: 1175*4kB (UMEH) 2647*8kB (UMEH) 1691*16kB (UMEH) 1393*32kB (UH) 823*64kB (UMH) 198*128kB (U) 3*256kB (U) 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 176804kB [ 2192.054221] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2192.055108] 103 total pagecache pages [ 2192.055511] 0 pages in swap cache [ 2192.055875] Swap cache stats: add 0, delete 0, find 0/0 [ 2192.056450] Free swap = 0kB [ 2192.056786] Total swap = 0kB [ 2192.057123] 524158 pages RAM [ 2192.057447] 0 pages HighMem/MovableOnly [ 2192.057857] 105055 pages reserved [ 2192.058239] Unreclaimable slab info: [ 2192.058629] Name Used Total [ 2192.059219] pid_3 7KB 7KB [ 2192.059787] pid_2 79KB 93KB [ 2192.060361] IEEE-802.15.4-MAC 63KB 63KB [ 2192.060927] IEEE-802.15.4-RAW 63KB 63KB [ 2192.061498] p9_req_t 8KB 8KB [ 2192.062058] ip6-frags 7KB 7KB [ 2192.062630] fib6_nodes 32KB 32KB [ 2192.063201] ip6_dst_cache 48KB 48KB [ 2192.063761] PINGv6 63KB 63KB [ 2192.064334] RAWv6 315KB 315KB [ 2192.064907] UDPLITEv6 62KB 62KB [ 2192.065476] UDPv6 62KB 62KB [ 2192.066044] tw_sock_TCPv6 7KB 7KB [ 2192.066613] request_sock_TCPv6 15KB 15KB [ 2192.067196] TCPv6 62KB 62KB [ 2192.067758] scsi_sense_cache 4KB 4KB [ 2192.068334] sd_ext_cdb 3KB 3KB [ 2192.068903] virtio_scsi_cmd 16KB 16KB [ 2192.069486] sgpool-128 89KB 178KB [ 2192.070050] sgpool-64 63KB 63KB [ 2192.070624] sgpool-32 819KB 819KB [ 2192.071200] sgpool-16 285KB 285KB [ 2192.071755] sgpool-8 180KB 180KB [ 2192.072335] io_kiocb 30KB 48KB [ 2192.072908] mqueue_inode_cache 62KB 62KB [ 2192.073489] nfs_commit_data 15KB 15KB [ 2192.074043] nfs_write_data 47KB 47KB [ 2192.074616] jbd2_inode 11KB 11KB [ 2192.075187] ext4_system_zone 7KB 7KB [ 2192.075740] ext4_io_end_vec 7KB 7KB [ 2192.076308] ext4_bio_post_read_ctx 15KB 15KB [ 2192.076924] kioctx 31KB 31KB [ 2192.077493] aio_kiocb 7KB 7KB [ 2192.078057] dio 92KB 92KB [ 2192.078631] bio-2 4KB 4KB [ 2192.079203] fasync_cache 7KB 7KB [ 2192.079766] pid_namespace 7KB 7KB [ 2192.080339] posix_timers_cache 15KB 15KB [ 2192.080920] rpc_buffers 31KB 31KB [ 2192.081482] rpc_tasks 3KB 3KB [ 2192.082045] UNIX 262KB 384KB [ 2192.082613] UDP-Lite 63KB 63KB [ 2192.083189] tcp_bind_bucket 8KB 8KB [ 2192.083746] inet_peer_cache 8KB 8KB [ 2192.084319] xfrm_state 32KB 32KB [ 2192.084887] ip_fib_trie 8KB 8KB [ 2192.085459] ip_fib_alias 15KB 15KB [ 2192.086021] ip_dst_cache 36KB 44KB [ 2192.086589] PING 62KB 62KB [ 2192.087155] RAW 93KB 93KB [ 2192.087715] UDP 378KB 378KB [ 2192.088290] tw_sock_TCP 15KB 15KB [ 2192.088859] request_sock_TCP 15KB 15KB [ 2192.089432] TCP 60KB 60KB [ 2192.089985] hugetlbfs_inode_cache 30KB 30KB [ 2192.090596] bio-1 11KB 11KB [ 2192.091170] eventpoll_pwq 23KB 23KB [ 2192.091724] eventpoll_epi 51KB 51KB [ 2192.092289] inotify_inode_mark 66KB 66KB [ 2192.092869] request_queue 90KB 90KB [ 2192.093441] blkdev_ioc 33KB 33KB [ 2192.093996] bio-0 596KB 596KB [ 2192.094574] biovec-max 777KB 867KB [ 2192.095153] biovec-64 986KB 992KB [ 2192.095712] biovec-16 183KB 183KB [ 2192.096279] user_namespace 31KB 31KB [ 2192.096858] uid_cache 8KB 8KB [ 2192.097429] dmaengine-unmap-2 4KB 4KB [ 2192.098001] audit_buffer 7KB 7KB [ 2192.098578] skbuff_fclone_cache 67KB 97KB [ 2192.099175] skbuff_head_cache 430KB 637KB [ 2192.099737] configfs_dir_cache 8KB 8KB [ 2192.100326] file_lock_cache 78KB 78KB [ 2192.100909] file_lock_ctx 7KB 7KB [ 2192.101478] fsnotify_mark_connector 32KB 32KB [ 2192.102101] net_namespace 132KB 172KB [ 2192.102656] task_delay_info 98KB 111KB [ 2192.103228] taskstats 100KB 100KB [ 2192.103790] proc_dir_entry 380KB 427KB [ 2192.104364] pde_opener 43KB 43KB [ 2192.104928] seq_file 60KB 63KB [ 2192.105509] sigqueue 110KB 110KB [ 2192.106087] shmem_inode_cache 1233KB 1477KB [ 2192.106639] kernfs_iattrs_cache 262KB 262KB [ 2192.107242] kernfs_node_cache 5820KB 5935KB [ 2192.107806] mnt_cache 236KB 236KB [ 2192.108387] filp 1005KB 1305KB [ 2192.108972] names_cache 7157KB 7467KB [ 2192.109544] hashtab_node 274KB 274KB [ 2192.110114] ebitmap_node 1153KB 1153KB [ 2192.110667] avtab_node 4976KB 4976KB [ 2192.111246] avc_node 35KB 35KB [ 2192.111835] lsm_inode_cache 2641KB 3047KB [ 2192.112414] lsm_file_cache 191KB 216KB [ 2192.112982] key_jar 39KB 39KB [ 2192.113560] uts_namespace 15KB 15KB [ 2192.114135] nsproxy 7KB 7KB [ 2192.114714] vm_area_struct 1136KB 1316KB [ 2192.115286] mm_struct 329KB 441KB [ 2192.115842] fs_cache 60KB 60KB [ 2192.116413] files_cache 226KB 270KB [ 2192.116983] signal_cache 448KB 524KB [ 2192.117559] sighand_cache 386KB 450KB [ 2192.118138] task_struct 853KB 1365KB [ 2192.118693] cred_jar 142KB 184KB [ 2192.119275] anon_vma_chain 272KB 362KB [ 2192.119836] anon_vma 213KB 282KB [ 2192.120410] pid 53KB 67KB [ 2192.120987] Acpi-Operand 160KB 194KB [ 2192.121575] Acpi-ParseExt 27KB 27KB [ 2192.122154] Acpi-Parse 177KB 193KB [ 2192.122717] Acpi-State 153KB 169KB [ 2192.123285] Acpi-Namespace 24KB 24KB [ 2192.123845] shared_policy_node 8KB 8KB [ 2192.124417] numa_policy 7KB 7KB [ 2192.124987] trace_event_file 163KB 163KB [ 2192.125561] ftrace_event_field 280KB 280KB [ 2192.126144] pool_workqueue 48KB 48KB [ 2192.126702] task_group 16KB 16KB [ 2192.127273] vmap_area 158KB 181KB [ 2192.127837] page->ptl 166KB 220KB [ 2192.128413] kmemleak_scan_area 89KB 131KB [ 2192.130080] kmemleak_object 129844KB 154373KB [ 2192.130654] kmalloc-8k 4304KB 4576KB [ 2192.131245] kmalloc-4k 7008KB 8464KB [ 2192.131821] kmalloc-2k 4604KB 5632KB [ 2192.132399] kmalloc-1k 2684KB 3680KB [ 2192.133016] kmalloc-512 2723KB 5072KB [ 2192.133591] kmalloc-256 1315KB 1480KB [ 2192.134164] kmalloc-192 753KB 768KB [ 2192.134741] kmalloc-128 534KB 724KB [ 2192.135336] kmalloc-96 366KB 644KB [ 2192.135918] kmalloc-64 836KB 1328KB [ 2192.136514] kmalloc-32 742KB 876KB [ 2192.137088] kmalloc-16 352KB 384KB [ 2192.137653] kmalloc-8 296KB 330KB [ 2192.138224] kmem_cache_node 47KB 47KB [ 2192.138787] kmem_cache 75KB 75KB [ 2192.139363] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/rsyslog.service,task=in:imklog,pid=12843,uid=0 [ 2192.141069] Out of memory (oom_kill_allocating_task): Killed process 12840 (rsyslogd) total-vm:220876kB, anon-rss:996kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:72kB oom_score_adj:0 [ 2192.193249] systemd[1]: systemd-journal-flush.service: Succeeded. [ 2192.203795] systemd[1]: Stopped Flush Journal to Persistent Storage. [ 2192.209196] systemd[1]: rsyslog.service: Main process exited, code=killed, status=9/KILL [ 2192.212274] systemd[1]: rsyslog.service: Failed with result 'signal'. [ 2192.220474] systemd[1]: ssh.service: Control process exited, code=killed, status=9/KILL [ 2192.221422] systemd[1]: ssh.service: Failed with result 'signal'. [ 2192.237186] systemd[1]: Failed to start OpenBSD Secure Shell server. [ 2192.244346] systemd[1]: Stopped target Bluetooth. [ 2192.245377] systemd[1]: Stopped Journal Service. [ 2192.247500] systemd[1]: systemd-journald.service: Consumed 7.430s CPU time. [ 2192.275175] systemd[1]: Starting Journal Service... [ 2192.438431] systemd-journald[12845]: File /var/log/journal/7e681e5076844de4a5cfa8606a84b008/system.journal corrupted or uncleanly shut down, renaming and replacing. [ 2192.553621] systemd[1]: rsyslog.service: Scheduled restart job, restart counter is at 2. [ 2192.554734] systemd[1]: ssh.service: Scheduled restart job, restart counter is at 3. [ 2192.555635] systemd[1]: Stopped System Logging Service. [ 2192.576713] systemd[1]: Starting System Logging Service... [ 2192.577527] systemd[1]: Stopped OpenBSD Secure Shell server. [ 2192.606795] systemd[1]: Starting OpenBSD Secure Shell server... [ 2192.656806] systemd[1]: Started System Logging Service. [ 2192.805905] systemd[1]: Started OpenBSD Secure Shell server. [ 2193.125007] systemd[1]: Started Journal Service. [ 2193.223899] systemd-journald[12845]: Received client request to flush runtime journal. VM DIAGNOSIS: 13:37:33 Registers: info registers vcpu 0 RAX=ffffffff83e50260 RBX=0000000000000000 RCX=ffffffff83e3833c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e50868 RBP=fffffbfff09c6450 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85670788 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e5026e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f56b65070b0 CR3=000000001a952000 CR4=00350ef0 DR0=0000000020000100 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=000000000000000000000000000000ff XMM02=000000000000000000000000000000ff XMM03=66207463656e6e6f6373696420646576 XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=0d0c0f0e09080b0a0504070601000302 XMM07=00000000000000000000000000000000 XMM08=736f6c63206e6f697463656e6e6f4300 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e50260 RBX=0000000000000001 RCX=ffffffff83e3833c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e50868 RBP=ffffed100112e000 RSP=ffff88800897fe70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85670788 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e5026e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f1e10783260 CR3=0000000034f26000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=756e696c2d34365f3638782f62696c2f XMM01=78756e696c657362696c2f756e672d78 XMM02=00312e6f732e78756e696c657362696c XMM03=2f756e672d78756e696c2d34365f3638 XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000